{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60026?format=json","vulnerability_id":"VCID-vrsm-6j4m-cka4","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","aliases":[{"alias":"CVE-2019-6454"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/372568?format=json","purl":"pkg:alpm/archlinux/systemd@241.7-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@241.7-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/940466?format=json","purl":"pkg:deb/debian/systemd@240-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@240-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"},{"url":"http://public2.vulnerablecode.io/api/packages/940442?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-cgv9-wdwy-5qfu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940440?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940444?format=json","purl":"pkg:deb/debian/systemd@257.9-1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.9-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940443?format=json","purl":"pkg:deb/debian/systemd@260.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/84746?format=json","purl":"pkg:ebuild/sys-apps/systemd@239-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-apps/systemd@239-r4"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/372567?format=json","purl":"pkg:alpm/archlinux/systemd@240.95-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@240.95-2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037152?format=json","purl":"pkg:deb/debian/systemd@44-11%2Bdeb7u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13xf-fn51-3qhe"},{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-3st2-3d7c-yuft"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5fyk-ea9c-6fd1"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-bvrs-m3qy-dyb1"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dn4b-qf6b-j7aj"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-egf8-guux-pybe"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-gkrw-z2cb-aud5"},{"vulnerability":"VCID-gp1n-ygnu-aydy"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-jxun-f52c-gfg9"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-qu2y-j7d2-auej"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-ucz9-1m21-zbhc"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-y58f-kwx7-m3ec"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@44-11%252Bdeb7u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1037153?format=json","purl":"pkg:deb/debian/systemd@204-14~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-3st2-3d7c-yuft"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-egf8-guux-pybe"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-gkrw-z2cb-aud5"},{"vulnerability":"VCID-gp1n-ygnu-aydy"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-jxun-f52c-gfg9"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-qu2y-j7d2-auej"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-ucz9-1m21-zbhc"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-y58f-kwx7-m3ec"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@204-14~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037154?format=json","purl":"pkg:deb/debian/systemd@215-17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-egf8-guux-pybe"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-gkrw-z2cb-aud5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-jxun-f52c-gfg9"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-qu2y-j7d2-auej"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-ucz9-1m21-zbhc"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-y58f-kwx7-m3ec"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@215-17"},{"url":"http://public2.vulnerablecode.io/api/packages/1037155?format=json","purl":"pkg:deb/debian/systemd@215-17%2Bdeb8u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-egf8-guux-pybe"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-gkrw-z2cb-aud5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-jxun-f52c-gfg9"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-qu2y-j7d2-auej"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-ucz9-1m21-zbhc"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-y58f-kwx7-m3ec"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@215-17%252Bdeb8u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1037156?format=json","purl":"pkg:deb/debian/systemd@230-7~bpo8%2B2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-egf8-guux-pybe"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-gkrw-z2cb-aud5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-jxun-f52c-gfg9"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-y58f-kwx7-m3ec"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@230-7~bpo8%252B2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/106766?format=json","purl":"pkg:rpm/redhat/redhat-release-virtualization-host@4.2-8.3?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2sfr-eba3-c7ch"},{"vulnerability":"VCID-8hpc-axe9-p7am"},{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-release-virtualization-host@4.2-8.3%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/106770?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.2-20190219.0?arch=el7_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2sfr-eba3-c7ch"},{"vulnerability":"VCID-8hpc-axe9-p7am"},{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.2-20190219.0%3Farch=el7_6"},{"url":"http://public2.vulnerablecode.io/api/packages/106764?format=json","purl":"pkg:rpm/redhat/rhvm-appliance@4.2-20190224.0?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhvm-appliance@4.2-20190224.0%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/106769?format=json","purl":"pkg:rpm/redhat/systemd@219-30.el7_3?arch=14","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-30.el7_3%3Farch=14"},{"url":"http://public2.vulnerablecode.io/api/packages/106765?format=json","purl":"pkg:rpm/redhat/systemd@219-42.el7_4?arch=16","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-42.el7_4%3Farch=16"},{"url":"http://public2.vulnerablecode.io/api/packages/106768?format=json","purl":"pkg:rpm/redhat/systemd@219-57.el7_5?arch=6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-57.el7_5%3Farch=6"},{"url":"http://public2.vulnerablecode.io/api/packages/106763?format=json","purl":"pkg:rpm/redhat/systemd@219-62.el7_6?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-62.el7_6%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/106767?format=json","purl":"pkg:rpm/redhat/systemd@239-13.el8_0?arch=3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vrsm-6j4m-cka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@239-13.el8_0%3Farch=3"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29098","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190327-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190327-0004/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4393","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4393"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/18/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/18/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/19/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/107081","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032","reference_id":"1667032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032"},{"reference_url":"https://security.archlinux.org/ASA-201902-24","reference_id":"ASA-201902-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-24"},{"reference_url":"https://security.archlinux.org/AVG-906","reference_id":"AVG-906","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-906"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454","reference_id":"CVE-2019-6454","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0368","reference_id":"RHSA-2019:0368","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0368"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0457","reference_id":"RHSA-2019:0457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0461","reference_id":"RHSA-2019:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0990","reference_id":"RHSA-2019:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1322","reference_id":"RHSA-2019:1322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1502","reference_id":"RHSA-2019:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2805","reference_id":"RHSA-2019:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2805"},{"reference_url":"https://usn.ubuntu.com/3891-1/","reference_id":"USN-3891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3891-1/"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."},{"cwe_id":787,"name":"Out-of-bounds Write","description":"The product writes data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":"4.9 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrsm-6j4m-cka4"}