{"url":"http://public2.vulnerablecode.io/api/packages/94062?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-147?arch=el8","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-147","qualifiers":{"arch":"el8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63424?format=json","vulnerability_id":"VCID-23y9-s6wr-c7dn","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10207.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10207","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.7214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.7206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72095","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72104","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200103-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200103-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1733874","reference_id":"1733874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1733874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10207","reference_id":"CVE-2019-10207","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"},{"reference_url":"https://usn.ubuntu.com/4145-1/","reference_id":"USN-4145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4145-1/"},{"reference_url":"https://usn.ubuntu.com/4147-1/","reference_id":"USN-4147-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4147-1/"}],"fixed_packages":[],"aliases":["CVE-2019-10207"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23y9-s6wr-c7dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63425?format=json","vulnerability_id":"VCID-2z4g-vpch-c7hj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10638.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10638","reference_id":"","reference_type":"","scores":[{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73289","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73295","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.7334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.7343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73429","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1729931","reference_id":"1729931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1729931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://usn.ubuntu.com/4114-1/","reference_id":"USN-4114-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4114-1/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4116-1/","reference_id":"USN-4116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4116-1/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-10638"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2z4g-vpch-c7hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82126?format=json","vulnerability_id":"VCID-38kt-fvjx-p3f2","summary":"kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15927.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15927","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30949","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30759","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30956","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15927"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759059","reference_id":"1759059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759059"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15927","reference_id":"CVE-2019-15927","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-15927"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38kt-fvjx-p3f2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82132?format=json","vulnerability_id":"VCID-3b12-3r7h-e7eb","summary":"kernel: use-after-free information leak in SMB2_read","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15920.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15920","reference_id":"","reference_type":"","scores":[{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67934","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67953","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15920"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760864","reference_id":"1760864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15920","reference_id":"CVE-2019-15920","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-15920"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3b12-3r7h-e7eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79270?format=json","vulnerability_id":"VCID-3fb7-pd8k-63e5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20811.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20811","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08202","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08365","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08297","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1846439","reference_id":"1846439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1846439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5023","reference_id":"RHSA-2020:5023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5026","reference_id":"RHSA-2020:5026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5026"},{"reference_url":"https://usn.ubuntu.com/4527-1/","reference_id":"USN-4527-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4527-1/"}],"fixed_packages":[],"aliases":["CVE-2019-20811"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3fb7-pd8k-63e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81765?format=json","vulnerability_id":"VCID-3nht-abdm-sbex","summary":"kernel: use-after-free read in napi_gro_frags() in the Linux kernel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10720.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10720","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32309","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32368","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31938","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781204","reference_id":"1781204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2854","reference_id":"RHSA-2020:2854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2854"}],"fixed_packages":[],"aliases":["CVE-2020-10720"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3nht-abdm-sbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82791?format=json","vulnerability_id":"VCID-3trr-t25v-3fd8","summary":"Kernel: KVM: leak of uninitialized stack contents to guest","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7222.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7222","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12743","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7222"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1759","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commits/master/arch/x86/kvm","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commits/master/arch/x86/kvm"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190404-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190404-0002/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/18/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/18/2"},{"reference_url":"http://www.securityfocus.com/bid/106963","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106963"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671930","reference_id":"1671930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671930"},{"reference_url":"https://security.archlinux.org/AVG-850","reference_id":"AVG-850","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7222","reference_id":"CVE-2019-7222","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/3930-1/","reference_id":"USN-3930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-1/"},{"reference_url":"https://usn.ubuntu.com/3930-2/","reference_id":"USN-3930-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-2/"},{"reference_url":"https://usn.ubuntu.com/3931-1/","reference_id":"USN-3931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-1/"},{"reference_url":"https://usn.ubuntu.com/3931-2/","reference_id":"USN-3931-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-2/"},{"reference_url":"https://usn.ubuntu.com/3932-1/","reference_id":"USN-3932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-1/"},{"reference_url":"https://usn.ubuntu.com/3932-2/","reference_id":"USN-3932-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-2/"},{"reference_url":"https://usn.ubuntu.com/3933-1/","reference_id":"USN-3933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-1/"},{"reference_url":"https://usn.ubuntu.com/3933-2/","reference_id":"USN-3933-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-2/"}],"fixed_packages":[],"aliases":["CVE-2019-7222"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3trr-t25v-3fd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82281?format=json","vulnerability_id":"VCID-3wb4-g3ex-xfdr","summary":"hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9506.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9506","reference_id":"","reference_type":"","scores":[{"value":"0.04458","scoring_system":"epss","scoring_elements":"0.89114","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04458","scoring_system":"epss","scoring_elements":"0.89081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04458","scoring_system":"epss","scoring_elements":"0.89077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04458","scoring_system":"epss","scoring_elements":"0.89074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04458","scoring_system":"epss","scoring_elements":"0.89089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.8919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89223","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04576","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727857","reference_id":"1727857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2975","reference_id":"RHSA-2019:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3055","reference_id":"RHSA-2019:3055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3076","reference_id":"RHSA-2019:3076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3089","reference_id":"RHSA-2019:3089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3165","reference_id":"RHSA-2019:3165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3187","reference_id":"RHSA-2019:3187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3217","reference_id":"RHSA-2019:3217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3218","reference_id":"RHSA-2019:3218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3220","reference_id":"RHSA-2019:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3231","reference_id":"RHSA-2019:3231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1460","reference_id":"RHSA-2020:1460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1460"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"},{"reference_url":"https://usn.ubuntu.com/4147-1/","reference_id":"USN-4147-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4147-1/"}],"fixed_packages":[],"aliases":["CVE-2019-9506"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wb4-g3ex-xfdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82032?format=json","vulnerability_id":"VCID-4ax3-5d9h-mqeu","summary":"kernel: Memory leak in sit_init_net() in net/ipv6/sit.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16994","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2273","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22762","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22592","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22888","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22809","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22803","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191031-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191031-0005/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759681","reference_id":"1759681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759681"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16994","reference_id":"CVE-2019-16994","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"}],"fixed_packages":[],"aliases":["CVE-2019-16994"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ax3-5d9h-mqeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82136?format=json","vulnerability_id":"VCID-585a-eedx-yucb","summary":"kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15924.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15924","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21777","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21781","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21942","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21817","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15924"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763869","reference_id":"1763869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763869"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15924","reference_id":"CVE-2019-15924","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15924"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-15924"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-585a-eedx-yucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82716?format=json","vulnerability_id":"VCID-813c-xj2p-3kgq","summary":"kernel: SCTP socket buffer memory leak leading to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3874.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3874","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39442","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39071","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686373","reference_id":"1686373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"}],"fixed_packages":[],"aliases":["CVE-2019-3874"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-813c-xj2p-3kgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82121?format=json","vulnerability_id":"VCID-95qt-y3b3-pbg7","summary":"kernel: use-after-free in SMB2_write function in fs/cifs/smb2pdu.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15919.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15919","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17747","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17569","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17692","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15919"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750410","reference_id":"1750410","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750410"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15919","reference_id":"CVE-2019-15919","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-15919"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95qt-y3b3-pbg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82517?format=json","vulnerability_id":"VCID-9jgx-kua4-q3bk","summary":"kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12382","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30646","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30648","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30332","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715554","reference_id":"1715554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"}],"fixed_packages":[],"aliases":["CVE-2019-12382"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jgx-kua4-q3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63421?format=json","vulnerability_id":"VCID-axdd-vkgz-cye9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3882.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3882","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10673","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10724","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10542","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10634","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1058","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1689426","reference_id":"1689426","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1689426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"}],"fixed_packages":[],"aliases":["CVE-2019-3882"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-axdd-vkgz-cye9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82123?format=json","vulnerability_id":"VCID-cjcd-saft-fqds","summary":"kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15916","reference_id":"","reference_type":"","scores":[{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85553","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15916"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750813","reference_id":"1750813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750813"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15916","reference_id":"CVE-2019-15916","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0740","reference_id":"RHSA-2020:0740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"}],"fixed_packages":[],"aliases":["CVE-2019-15916"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjcd-saft-fqds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83021?format=json","vulnerability_id":"VCID-drgs-3u3a-v3h1","summary":"kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19854.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19854.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19854","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16585","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16563","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16453","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656986","reference_id":"1656986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/3872-1/","reference_id":"USN-3872-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3872-1/"},{"reference_url":"https://usn.ubuntu.com/3878-1/","reference_id":"USN-3878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3878-1/"},{"reference_url":"https://usn.ubuntu.com/3878-2/","reference_id":"USN-3878-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3878-2/"},{"reference_url":"https://usn.ubuntu.com/3901-1/","reference_id":"USN-3901-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3901-1/"},{"reference_url":"https://usn.ubuntu.com/3901-2/","reference_id":"USN-3901-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3901-2/"}],"fixed_packages":[],"aliases":["CVE-2018-19854"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drgs-3u3a-v3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82977?format=json","vulnerability_id":"VCID-efar-vyrf-8fau","summary":"kernel: nfs: use-after-free in svc_process_common()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16884.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16884","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14861","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14867","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14865","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1481","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660375","reference_id":"1660375","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1873","reference_id":"RHSA-2019:1873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1891","reference_id":"RHSA-2019:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2696","reference_id":"RHSA-2019:2696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2730","reference_id":"RHSA-2019:2730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2854","reference_id":"RHSA-2020:2854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2854"},{"reference_url":"https://usn.ubuntu.com/3932-1/","reference_id":"USN-3932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-1/"},{"reference_url":"https://usn.ubuntu.com/3932-2/","reference_id":"USN-3932-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-2/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"}],"fixed_packages":[],"aliases":["CVE-2018-16884"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efar-vyrf-8fau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82877?format=json","vulnerability_id":"VCID-ffu4-v4aq-1bdz","summary":"kernel: Heap address information leak while using L2CAP_GET_CONF_OPT","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3459","reference_id":"","reference_type":"","scores":[{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64386","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64345","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3459"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=1120758","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=1120758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"},{"reference_url":"https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/","reference_id":"","reference_type":"","scores":[],"url":"https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/"},{"reference_url":"https://marc.info/?l=oss-security&m=154721580222522&w=2","reference_id":"","reference_type":"","scores":[],"url":"https://marc.info/?l=oss-security&m=154721580222522&w=2"},{"reference_url":"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html","reference_id":"","reference_type":"","scores":[],"url":"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/27/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/27/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/27/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/27/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/28/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/28/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/28/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/28/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/08/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/08/12/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663176","reference_id":"1663176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663176"},{"reference_url":"https://security.archlinux.org/AVG-988","reference_id":"AVG-988","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-988"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3459","reference_id":"CVE-2019-3459","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0740","reference_id":"RHSA-2020:0740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"reference_url":"https://usn.ubuntu.com/3930-1/","reference_id":"USN-3930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-1/"},{"reference_url":"https://usn.ubuntu.com/3930-2/","reference_id":"USN-3930-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-2/"},{"reference_url":"https://usn.ubuntu.com/3931-1/","reference_id":"USN-3931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-1/"},{"reference_url":"https://usn.ubuntu.com/3931-2/","reference_id":"USN-3931-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-2/"},{"reference_url":"https://usn.ubuntu.com/3932-1/","reference_id":"USN-3932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-1/"},{"reference_url":"https://usn.ubuntu.com/3932-2/","reference_id":"USN-3932-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-2/"},{"reference_url":"https://usn.ubuntu.com/3933-1/","reference_id":"USN-3933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-1/"},{"reference_url":"https://usn.ubuntu.com/3933-2/","reference_id":"USN-3933-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-2/"}],"fixed_packages":[],"aliases":["CVE-2019-3459"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffu4-v4aq-1bdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79039?format=json","vulnerability_id":"VCID-fk54-8rrc-ekc2","summary":"security update","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5489.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5489.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5489","reference_id":"","reference_type":"","scores":[{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.4313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43175","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43115","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63149","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63185","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5489"},{"reference_url":"https://arxiv.org/abs/1901.01161","reference_id":"","reference_type":"","scores":[],"url":"https://arxiv.org/abs/1901.01161"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1120843","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1120843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/26","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/26"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190307-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190307-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4465","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4465"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/","reference_id":"","reference_type":"","scores":[],"url":"https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en"},{"reference_url":"http://www.securityfocus.com/bid/106478","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1664110","reference_id":"1664110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1664110"},{"reference_url":"https://security.archlinux.org/AVG-842","reference_id":"AVG-842","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-842"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5489","reference_id":"CVE-2019-5489","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2473","reference_id":"RHSA-2019:2473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2808","reference_id":"RHSA-2019:2808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2809","reference_id":"RHSA-2019:2809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2837","reference_id":"RHSA-2019:2837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3967","reference_id":"RHSA-2019:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4056","reference_id":"RHSA-2019:4056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4057","reference_id":"RHSA-2019:4057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4058","reference_id":"RHSA-2019:4058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4159","reference_id":"RHSA-2019:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4164","reference_id":"RHSA-2019:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4255","reference_id":"RHSA-2019:4255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"}],"fixed_packages":[],"aliases":["CVE-2019-5489"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fk54-8rrc-ekc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82878?format=json","vulnerability_id":"VCID-h2h4-ypwg-rbh8","summary":"kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3460","reference_id":"","reference_type":"","scores":[{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64386","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64345","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"},{"reference_url":"https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/","reference_id":"","reference_type":"","scores":[],"url":"https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/"},{"reference_url":"https://marc.info/?l=oss-security&m=154721580222522&w=2","reference_id":"","reference_type":"","scores":[],"url":"https://marc.info/?l=oss-security&m=154721580222522&w=2"},{"reference_url":"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html","reference_id":"","reference_type":"","scores":[],"url":"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/27/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/27/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/27/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/27/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/28/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/28/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/06/28/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/06/28/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/08/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/08/12/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663179","reference_id":"1663179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663179"},{"reference_url":"https://security.archlinux.org/AVG-988","reference_id":"AVG-988","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-988"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3460","reference_id":"CVE-2019-3460","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0740","reference_id":"RHSA-2020:0740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"reference_url":"https://usn.ubuntu.com/3930-1/","reference_id":"USN-3930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-1/"},{"reference_url":"https://usn.ubuntu.com/3930-2/","reference_id":"USN-3930-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3930-2/"},{"reference_url":"https://usn.ubuntu.com/3931-1/","reference_id":"USN-3931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-1/"},{"reference_url":"https://usn.ubuntu.com/3931-2/","reference_id":"USN-3931-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3931-2/"},{"reference_url":"https://usn.ubuntu.com/3932-1/","reference_id":"USN-3932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-1/"},{"reference_url":"https://usn.ubuntu.com/3932-2/","reference_id":"USN-3932-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3932-2/"},{"reference_url":"https://usn.ubuntu.com/3933-1/","reference_id":"USN-3933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-1/"},{"reference_url":"https://usn.ubuntu.com/3933-2/","reference_id":"USN-3933-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3933-2/"}],"fixed_packages":[],"aliases":["CVE-2019-3460"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2h4-ypwg-rbh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79049?format=json","vulnerability_id":"VCID-h9yg-sv8b-mkhf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11599.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11599","reference_id":"","reference_type":"","scores":[{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67862","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.6796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68014","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705937","reference_id":"1705937","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705937"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1790","reference_id":"CVE-2019-11599","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1790"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46781.txt","reference_id":"CVE-2019-11599","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46781.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0100","reference_id":"RHSA-2020:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0103","reference_id":"RHSA-2020:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0179","reference_id":"RHSA-2020:0179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0543","reference_id":"RHSA-2020:0543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0543"},{"reference_url":"https://usn.ubuntu.com/4069-1/","reference_id":"USN-4069-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-1/"},{"reference_url":"https://usn.ubuntu.com/4069-2/","reference_id":"USN-4069-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-2/"},{"reference_url":"https://usn.ubuntu.com/4095-1/","reference_id":"USN-4095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-1/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-11599"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9yg-sv8b-mkhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82435?format=json","vulnerability_id":"VCID-hmp6-1pt2-3udk","summary":"kernel: use-after-free in arch/x86/lib/insn-eval.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13233","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16471","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16969","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727756","reference_id":"1727756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"},{"reference_url":"https://usn.ubuntu.com/4093-1/","reference_id":"USN-4093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4093-1/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-13233"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmp6-1pt2-3udk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79052?format=json","vulnerability_id":"VCID-jqvb-tqv1-dfe5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11884","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14775","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14825","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1465","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709837","reference_id":"1709837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0740","reference_id":"RHSA-2020:0740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://usn.ubuntu.com/4068-1/","reference_id":"USN-4068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4068-1/"},{"reference_url":"https://usn.ubuntu.com/4068-2/","reference_id":"USN-4068-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4068-2/"},{"reference_url":"https://usn.ubuntu.com/4069-1/","reference_id":"USN-4069-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-1/"},{"reference_url":"https://usn.ubuntu.com/4069-2/","reference_id":"USN-4069-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-2/"},{"reference_url":"https://usn.ubuntu.com/4076-1/","reference_id":"USN-4076-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4076-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-11884"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqvb-tqv1-dfe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82217?format=json","vulnerability_id":"VCID-jv35-tmzb-tuag","summary":"kernel: out-of-bounds array access in __xfrm_policy_unlink","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15666.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15666","reference_id":"","reference_type":"","scores":[{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89979","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.8998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89967","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05225","scoring_system":"epss","scoring_elements":"0.89968","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15666"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1747334","reference_id":"1747334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1747334"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15666","reference_id":"CVE-2019-15666","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1493","reference_id":"RHSA-2020:1493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1493"}],"fixed_packages":[],"aliases":["CVE-2019-15666"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jv35-tmzb-tuag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79240?format=json","vulnerability_id":"VCID-kecy-99uv-fqdy","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14821.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14821","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28499","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28873","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28726","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746708","reference_id":"1746708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3978","reference_id":"RHSA-2019:3978","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3978"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3979","reference_id":"RHSA-2019:3979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4154","reference_id":"RHSA-2019:4154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4256","reference_id":"RHSA-2019:4256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0027","reference_id":"RHSA-2020:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"},{"reference_url":"https://usn.ubuntu.com/4157-1/","reference_id":"USN-4157-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4157-1/"},{"reference_url":"https://usn.ubuntu.com/4157-2/","reference_id":"USN-4157-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4157-2/"},{"reference_url":"https://usn.ubuntu.com/4162-1/","reference_id":"USN-4162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4162-1/"},{"reference_url":"https://usn.ubuntu.com/4162-2/","reference_id":"USN-4162-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4162-2/"},{"reference_url":"https://usn.ubuntu.com/4163-1/","reference_id":"USN-4163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4163-1/"},{"reference_url":"https://usn.ubuntu.com/4163-2/","reference_id":"USN-4163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4163-2/"}],"fixed_packages":[],"aliases":["CVE-2019-14821"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kecy-99uv-fqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55987?format=json","vulnerability_id":"VCID-nqb6-zp72-1bdz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1593","reference_id":"","reference_type":"","scores":[{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83456","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83469","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83483","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.8353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83524","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83555","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01966","scoring_system":"epss","scoring_elements":"0.83593","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1192519","reference_id":"1192519","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1192519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1137","reference_id":"RHSA-2015:1137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1138","reference_id":"RHSA-2015:1138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1139","reference_id":"RHSA-2015:1139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1221","reference_id":"RHSA-2015:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/2560-1/","reference_id":"USN-2560-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2560-1/"},{"reference_url":"https://usn.ubuntu.com/2561-1/","reference_id":"USN-2561-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2561-1/"},{"reference_url":"https://usn.ubuntu.com/2562-1/","reference_id":"USN-2562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2562-1/"},{"reference_url":"https://usn.ubuntu.com/2563-1/","reference_id":"USN-2563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2563-1/"},{"reference_url":"https://usn.ubuntu.com/2564-1/","reference_id":"USN-2564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2564-1/"},{"reference_url":"https://usn.ubuntu.com/2565-1/","reference_id":"USN-2565-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2565-1/"}],"fixed_packages":[],"aliases":["CVE-2015-1593"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqb6-zp72-1bdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82133?format=json","vulnerability_id":"VCID-ns4n-ng6b-ufaf","summary":"kernel: memory leak in genl_register_family() in net/netlink/genetlink.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15921.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15921.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15921","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21828","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22076","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22049","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2204","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15921"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760958","reference_id":"1760958","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760958"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15921","reference_id":"CVE-2019-15921","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-15921"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ns4n-ng6b-ufaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63422?format=json","vulnerability_id":"VCID-p64t-t6cs-rud3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3900.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3900","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4304","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42806","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1698757","reference_id":"1698757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1698757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1973","reference_id":"RHSA-2019:1973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3220","reference_id":"RHSA-2019:3220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3836","reference_id":"RHSA-2019:3836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3967","reference_id":"RHSA-2019:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4058","reference_id":"RHSA-2019:4058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://usn.ubuntu.com/4114-1/","reference_id":"USN-4114-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4114-1/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4116-1/","reference_id":"USN-4116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4116-1/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-3900"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p64t-t6cs-rud3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82236?format=json","vulnerability_id":"VCID-qbax-4n63-jqbk","summary":"kernel: use-after-free in sound/core/init.c and sound/core/info.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15214.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15214","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24516","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24576","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24487","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15214"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190905-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190905-0002/"},{"reference_url":"https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9","reference_id":"","reference_type":"","scores":[],"url":"https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/08/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/08/20/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743591","reference_id":"1743591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743591"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15214","reference_id":"CVE-2019-15214","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-15214"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbax-4n63-jqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82945?format=json","vulnerability_id":"VCID-r7p3-vgra-17d2","summary":"kernel: oob memory read in hso_probe in drivers/net/usb/hso.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html"},{"reference_url":"http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19985.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19985","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1278","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12797","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hexhive.epfl.ch/projects/perifuzz/","reference_id":"","reference_type":"","scores":[],"url":"https://hexhive.epfl.ch/projects/perifuzz/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/52","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/52"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190404-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190404-0002/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666106","reference_id":"1666106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666106"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19985","reference_id":"CVE-2018-19985","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://usn.ubuntu.com/3910-1/","reference_id":"USN-3910-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3910-1/"},{"reference_url":"https://usn.ubuntu.com/3910-2/","reference_id":"USN-3910-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3910-2/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2018-19985"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7p3-vgra-17d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79043?format=json","vulnerability_id":"VCID-t37c-fdcm-fudm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10126.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10126","reference_id":"","reference_type":"","scores":[{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86885","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03158","scoring_system":"epss","scoring_elements":"0.86959","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716992","reference_id":"1716992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3055","reference_id":"RHSA-2019:3055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3076","reference_id":"RHSA-2019:3076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3089","reference_id":"RHSA-2019:3089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0174","reference_id":"RHSA-2020:0174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://usn.ubuntu.com/4093-1/","reference_id":"USN-4093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4093-1/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4095-1/","reference_id":"USN-4095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-1/"},{"reference_url":"https://usn.ubuntu.com/4095-2/","reference_id":"USN-4095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-2/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-10126"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t37c-fdcm-fudm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77659?format=json","vulnerability_id":"VCID-tgzq-uucd-uqgt","summary":"kernel: out-of-bounds memory accesses in netlabel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25160.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25160","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02394","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02602","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02452","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02459","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000","reference_id":"1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266290","reference_id":"2266290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266290"},{"reference_url":"https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f","reference_id":"5578de4834fe0f2a34fedc7374be691443396d1f","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f"},{"reference_url":"https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272","reference_id":"97bc3683c24999ee621d847c9348c75d2fe86272","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272"},{"reference_url":"https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950","reference_id":"c61d01faa5550e06794dcf86125ccd325bfad950","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950"},{"reference_url":"https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e","reference_id":"dc18101f95fa6e815f426316b8b9a5cee28a334e","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e"},{"reference_url":"https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb","reference_id":"e3713abc4248aa6bcc11173d754c418b02a62cbb","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb"},{"reference_url":"https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78","reference_id":"fbf9578919d6c91100ec63acf2cba641383f6c78","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78"},{"reference_url":"https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c","reference_id":"fcfe700acdc1c72eab231300e82b962bac2b2b2c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/"}],"url":"https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"}],"fixed_packages":[],"aliases":["CVE-2019-25160"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tgzq-uucd-uqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82957?format=json","vulnerability_id":"VCID-uss1-mjb5-fqb4","summary":"kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20169","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29143","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31165","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660385","reference_id":"1660385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660385"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2770","reference_id":"RHSA-2020:2770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2777","reference_id":"RHSA-2020:2777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"},{"reference_url":"https://usn.ubuntu.com/3879-1/","reference_id":"USN-3879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3879-1/"},{"reference_url":"https://usn.ubuntu.com/3879-2/","reference_id":"USN-3879-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3879-2/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2018-20169"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uss1-mjb5-fqb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79051?format=json","vulnerability_id":"VCID-v5rq-g6e5-jbap","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11833.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11833","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06649","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06644","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1712072","reference_id":"1712072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1712072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://usn.ubuntu.com/4068-1/","reference_id":"USN-4068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4068-1/"},{"reference_url":"https://usn.ubuntu.com/4068-2/","reference_id":"USN-4068-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4068-2/"},{"reference_url":"https://usn.ubuntu.com/4069-1/","reference_id":"USN-4069-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-1/"},{"reference_url":"https://usn.ubuntu.com/4069-2/","reference_id":"USN-4069-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4069-2/"},{"reference_url":"https://usn.ubuntu.com/4076-1/","reference_id":"USN-4076-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4076-1/"},{"reference_url":"https://usn.ubuntu.com/4095-2/","reference_id":"USN-4095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-2/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-11833"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v5rq-g6e5-jbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63428?format=json","vulnerability_id":"VCID-xf8u-tez7-rug4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13648.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13648","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25466","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26803","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26729","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26999","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735630","reference_id":"1735630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3019","reference_id":"RHSA-2020:3019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3019"},{"reference_url":"https://usn.ubuntu.com/4114-1/","reference_id":"USN-4114-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4114-1/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4116-1/","reference_id":"USN-4116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4116-1/"}],"fixed_packages":[],"aliases":["CVE-2019-13648"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xf8u-tez7-rug4"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-147%3Farch=el8"}