Raw Object
{
"sha256": "95a0a3554554f989dd9637c6caa38e97d70bd5b6015c9cea82a0e529d4f283ae",
"sha1": "70af445f03f1508fe71235fca6c855e682a32ffb",
"md5": "b3fe02aec19e475ba06ac9f974a1fc1d",
"type": "DEB",
"arch": "AMD64",
"name": "linux-gke-4.15-headers-4.15.0-1071",
"filename": "linux-gke-4.15-headers-4.15.0-1071_4.15.0-1071.74_amd64.deb",
"size": 74481,
"description": "Header files related to Linux kernel version 4.15.0\nThis package provides kernel header files for version 4.15.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-gke-4.15-headers-4.15.0-1071/debian.README.gz for details",
"url": null,
"version": "4.15.0-1071.74",
"source": "linux-gke-4.15",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2020-14314",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:00:49+00:00",
"updated_at": "2021-07-17T06:00:49+00:00"
},
{
"name": "CVE-2020-25284",
"risk": 41,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:08:01+00:00",
"updated_at": "2021-07-17T06:08:01+00:00"
},
{
"name": "CVE-2020-14390",
"risk": 56,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:10:00+00:00",
"updated_at": "2021-07-17T06:10:00+00:00"
},
{
"name": "CVE-2020-25212",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:23:44+00:00",
"updated_at": "2021-07-17T06:23:44+00:00"
},
{
"name": "CVE-2020-0465",
"risk": 72,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:25:44+00:00",
"updated_at": "2021-07-17T06:25:44+00:00"
},
{
"name": "CVE-2020-25641",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:34:01+00:00",
"updated_at": "2021-07-17T06:34:01+00:00"
},
{
"name": "CVE-2020-14351",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:37:16+00:00",
"updated_at": "2021-07-17T06:37:16+00:00"
},
{
"name": "CVE-2020-26088",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:51:08+00:00",
"updated_at": "2021-07-17T06:51:08+00:00"
},
{
"name": "CVE-2020-0466",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:54:36+00:00",
"updated_at": "2021-07-17T06:54:36+00:00"
},
{
"name": "CVE-2020-25285",
"risk": 64,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T06:58:27+00:00",
"updated_at": "2021-07-17T06:58:27+00:00"
},
{
"name": "CVE-2020-25643",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:04:59+00:00",
"updated_at": "2021-07-17T07:04:59+00:00"
},
{
"name": "CVE-2020-25645",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:08:00+00:00",
"updated_at": "2021-07-17T07:08:00+00:00"
},
{
"name": "CVE-2019-19448",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:14:27+00:00",
"updated_at": "2021-07-17T07:14:27+00:00"
},
{
"name": "CVE-2020-29371",
"risk": 33,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:14:54+00:00",
"updated_at": "2021-07-17T07:14:54+00:00"
},
{
"name": "CVE-2020-25211",
"risk": 60,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:15:03+00:00",
"updated_at": "2021-07-17T07:15:03+00:00"
},
{
"name": "CVE-2020-28915",
"risk": 61,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T07:15:12+00:00",
"updated_at": "2021-07-17T07:15:12+00:00"
},
{
"name": "CVE-2020-16120",
"risk": 44,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T08:10:16+00:00",
"updated_at": "2021-07-17T08:10:16+00:00"
},
{
"name": "CVE-2020-16119",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2021-07-17T09:27:48+00:00",
"updated_at": "2021-07-17T09:27:48+00:00"
}
],
"risk": 78,
"vulnerable": 78,
"outdated": 0,
"malicious": 0,
"created_at": "2020-09-22T09:16:10+00:00",
"updated_at": "2021-07-17T01:11:01+00:00",
"deleted_at": null
}