Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/106122?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/106122?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-693.47.2?arch=el7", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "3.10.0-693.47.2", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83751?format=api", "vulnerability_id": "VCID-3are-f6u7-7kdr", "summary": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29972", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29979", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29974", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30073", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173", "reference_id": "1535173", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384", "reference_id": "RHSA-2018:2384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395", "reference_id": "RHSA-2018:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" } ], "fixed_packages": [], "aliases": [ "CVE-2017-13215" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3are-f6u7-7kdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63550?format=api", "vulnerability_id": "VCID-3x2q-tv4w-5qam", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16939.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16939.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16939", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.9314", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.9309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93102", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10155", "scoring_system": "epss", "scoring_elements": "0.93104", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16939" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1069702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1069702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" }, { "reference_url": "http://seclists.org/fulldisclosure/2017/Nov/40", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2017/Nov/40" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/1137b5e2529a8f5ca8ee709288ecba3e68044df2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/1137b5e2529a8f5ca8ee709288ecba3e68044df2" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11" }, { "reference_url": "http://www.securityfocus.com/bid/101954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101954" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220", "reference_id": "1517220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://blogs.securiteam.com/index.php/archives/3535", "reference_id": "CVE-2017-16939", "reference_type": "exploit", "scores": [], "url": "https://blogs.securiteam.com/index.php/archives/3535" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44049.md", "reference_id": "CVE-2017-16939", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44049.md" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "reference_id": "CVE-2017-16939", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0654", "reference_id": "RHSA-2018:0654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1318", "reference_id": "RHSA-2018:1318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1355", "reference_id": "RHSA-2018:1355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3507-1/", "reference_id": "USN-3507-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3507-1/" }, { "reference_url": "https://usn.ubuntu.com/3507-2/", "reference_id": "USN-3507-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3507-2/" }, { "reference_url": "https://usn.ubuntu.com/3508-1/", "reference_id": "USN-3508-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3508-1/" }, { "reference_url": "https://usn.ubuntu.com/3508-2/", "reference_id": "USN-3508-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3508-2/" }, { "reference_url": "https://usn.ubuntu.com/3509-1/", "reference_id": "USN-3509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3509-1/" }, { "reference_url": "https://usn.ubuntu.com/3509-2/", "reference_id": "USN-3509-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3509-2/" }, { "reference_url": "https://usn.ubuntu.com/3510-1/", "reference_id": "USN-3510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3510-1/" }, { "reference_url": "https://usn.ubuntu.com/3510-2/", "reference_id": "USN-3510-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3510-2/" }, { "reference_url": "https://usn.ubuntu.com/3511-1/", "reference_id": "USN-3511-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3511-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-16939" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3x2q-tv4w-5qam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83389?format=api", "vulnerability_id": "VCID-4dym-q5nf-w3d8", "summary": "kernel: Use-after-free due to race condition in AF_PACKET implementation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.7463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74639", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74684", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74712", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1641878", "reference_id": "1641878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1641878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0163", "reference_id": "RHSA-2019:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0188", "reference_id": "RHSA-2019:0188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3967", "reference_id": "RHSA-2019:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4159", "reference_id": "RHSA-2019:4159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0174", "reference_id": "RHSA-2020:0174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0174" } ], "fixed_packages": [], "aliases": [ "CVE-2018-18559" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dym-q5nf-w3d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63515?format=api", "vulnerability_id": "VCID-62uu-curp-mydg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22328", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22203", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22326", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22407", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22482", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22387", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22404", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:C" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928", "reference_id": "1474928", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1965", "reference_id": "RHSA-2018:1965", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2003", "reference_id": "RHSA-2018:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" } ], "fixed_packages": [], "aliases": [ "CVE-2017-11600" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62uu-curp-mydg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4184?format=api", "vulnerability_id": "VCID-9yut-bdsw-gkfy", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782", "reference_id": "1667782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12127" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yut-bdsw-gkfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83946?format=api", "vulnerability_id": "VCID-a6md-wqt8-cbhh", "summary": "kernel: memory leak when merging buffers in SCSI IO vectors", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058" }, { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22533", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25947", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26069", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26109", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" }, { "reference_url": "http://seclists.org/oss-sec/2017/q4/52", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2017/q4/52" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:M/C:N/I:N/A:C" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058" }, { "reference_url": "https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8" }, { "reference_url": "http://www.securityfocus.com/bid/101911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101911" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089", "reference_id": "1495089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190", "reference_id": "CVE-2017-12190", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0654", "reference_id": "RHSA-2018:0654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3487-1/", "reference_id": "USN-3487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3487-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-1/", "reference_id": "USN-3582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3582-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-2/", "reference_id": "USN-3582-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3582-2/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-12190" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6md-wqt8-cbhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63554?format=api", "vulnerability_id": "VCID-akwn-9252-ufdn", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2017/12/12/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/12/12/7" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2216", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22235", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22134", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22128", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22079", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4073", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.spinics.net/lists/linux-usb/msg163644.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.spinics.net/lists/linux-usb/msg163644.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474", "reference_id": "1525474", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525474" }, { "reference_url": "https://security.archlinux.org/ASA-201801-1", "reference_id": "ASA-201801-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-1" }, { "reference_url": "https://security.archlinux.org/ASA-201801-2", "reference_id": "ASA-201801-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-2" }, { "reference_url": "https://security.archlinux.org/ASA-201801-3", "reference_id": "ASA-201801-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-3" }, { "reference_url": "https://security.archlinux.org/ASA-201801-4", "reference_id": "ASA-201801-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-4" }, { "reference_url": "https://security.archlinux.org/AVG-552", "reference_id": "AVG-552", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-552" }, { "reference_url": "https://security.archlinux.org/AVG-561", "reference_id": "AVG-561", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-561" }, { "reference_url": "https://security.archlinux.org/AVG-571", "reference_id": "AVG-571", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-571" }, { "reference_url": "https://security.archlinux.org/AVG-574", "reference_id": "AVG-574", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-574" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558", "reference_id": "CVE-2017-17558", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17558" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-17558" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-akwn-9252-ufdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63456?format=api", "vulnerability_id": "VCID-c18m-kjfu-kkb5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1068.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1068.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08924", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08928", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08908", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09018", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09017", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08968", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08859", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08834", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08983", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0903", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048", "reference_id": "1552048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1318", "reference_id": "RHSA-2018:1318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1355", "reference_id": "RHSA-2018:1355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2948", "reference_id": "RHSA-2018:2948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4159", "reference_id": "RHSA-2019:4159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "reference_url": "https://usn.ubuntu.com/3654-1/", "reference_id": "USN-3654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-1/" }, { "reference_url": "https://usn.ubuntu.com/3654-2/", "reference_id": "USN-3654-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-2/" }, { "reference_url": "https://usn.ubuntu.com/3656-1/", "reference_id": "USN-3656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3656-1/" }, { "reference_url": "https://usn.ubuntu.com/3674-1/", "reference_id": "USN-3674-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3674-1/" }, { "reference_url": "https://usn.ubuntu.com/3674-2/", "reference_id": "USN-3674-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3674-2/" }, { "reference_url": "https://usn.ubuntu.com/3677-1/", "reference_id": "USN-3677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3677-1/" }, { "reference_url": "https://usn.ubuntu.com/3677-2/", "reference_id": "USN-3677-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3677-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-1068" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c18m-kjfu-kkb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84793?format=api", "vulnerability_id": "VCID-dtrq-wkdm-2qg8", "summary": "kernel: Buffer overflow in firewire driver via crafted incoming packets", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8633.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.75997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76125", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76102", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76086", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76061", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00927", "scoring_system": "epss", "scoring_elements": "0.76098", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490", "reference_id": "1391490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3445-1/", "reference_id": "USN-3445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3445-1/" }, { "reference_url": "https://usn.ubuntu.com/3445-2/", "reference_id": "USN-3445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3445-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8633" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrq-wkdm-2qg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4186?format=api", "vulnerability_id": "VCID-k45n-139y-pyeq", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312", "reference_id": "1705312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11091" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k45n-139y-pyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63560?format=api", "vulnerability_id": "VCID-pd2f-8535-97hg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000407.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000407.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2017-1000407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2017-1000407" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64051", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63961", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64027", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63997", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64032", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64002", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4073", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "reference_url": "https://www.spinics.net/lists/kvm/msg159809.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.spinics.net/lists/kvm/msg159809.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/12/04/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/12/04/2" }, { "reference_url": "http://www.securityfocus.com/bid/102038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102038" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328", "reference_id": "1520328", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520328" }, { "reference_url": "https://security.archlinux.org/AVG-562", "reference_id": "AVG-562", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-562" }, { "reference_url": "https://security.archlinux.org/AVG-563", "reference_id": "AVG-563", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-563" }, { "reference_url": "https://security.archlinux.org/AVG-564", "reference_id": "AVG-564", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-564" }, { "reference_url": "https://security.archlinux.org/AVG-565", "reference_id": "AVG-565", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-565" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407", "reference_id": "CVE-2017-1000407", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3632-1/", "reference_id": "USN-3632-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3632-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-1000407" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pd2f-8535-97hg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85354?format=api", "vulnerability_id": "VCID-r5uv-213t-pufd", "summary": "kernel: media: use-after-free in [tuner-xc2028] media driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7913.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7913.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7913", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64262", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67429", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.6746", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.6745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67497", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885", "reference_id": "1402885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3798-1/", "reference_id": "USN-3798-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3798-1/" }, { "reference_url": "https://usn.ubuntu.com/3798-2/", "reference_id": "USN-3798-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3798-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7913" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5uv-213t-pufd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4153?format=api", "vulnerability_id": "VCID-unyv-cxb5-ruga", "summary": "Speculative register leakage from lazy FPU context switching", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79345", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.7936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79387", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79419", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79422", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01258", "scoring_system": "epss", "scoring_elements": "0.79458", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585011", "reference_id": "1585011", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1852", "reference_id": "RHSA-2018:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1944", "reference_id": "RHSA-2018:1944", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1944" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2164", "reference_id": "RHSA-2018:2164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2165", "reference_id": "RHSA-2018:2165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3696-1/", "reference_id": "USN-3696-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3696-1/" }, { "reference_url": "https://usn.ubuntu.com/3696-2/", "reference_id": "USN-3696-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3696-2/" }, { "reference_url": "https://usn.ubuntu.com/3698-1/", "reference_id": "USN-3698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-1/" }, { "reference_url": "https://usn.ubuntu.com/3698-2/", "reference_id": "USN-3698-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-267.html", "reference_id": "XSA-267", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-267.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-3665", "XSA-267" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unyv-cxb5-ruga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4183?format=api", "vulnerability_id": "VCID-vh89-pyaz-xbdg", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781", "reference_id": "1646781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12126", "XSA-297" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh89-pyaz-xbdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4185?format=api", "vulnerability_id": "VCID-z9r8-s6v7-zkgd", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67565", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67568", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784", "reference_id": "1646784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12130" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9r8-s6v7-zkgd" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-693.47.2%3Farch=el7" }