Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-access-insights-puppet@0.0.9-2?arch=el7sat
Typerpm
Namespaceredhat
Nameredhat-access-insights-puppet
Version0.0.9-2
Qualifiers
arch el7sat
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-18aq-72zg-3uc9
vulnerability_id VCID-18aq-72zg-3uc9
summary puppet: Unsafe YAML deserialization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2295.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2295
reference_id
reference_type
scores
0
value 0.01893
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-01T12:55:00Z
1
value 0.01893
scoring_system epss
scoring_elements 0.83258
published_at 2026-04-24T12:55:00Z
2
value 0.01893
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-18T12:55:00Z
3
value 0.01893
scoring_system epss
scoring_elements 0.83236
published_at 2026-04-21T12:55:00Z
4
value 0.01893
scoring_system epss
scoring_elements 0.83147
published_at 2026-04-02T12:55:00Z
5
value 0.01893
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-04T12:55:00Z
6
value 0.01893
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-07T12:55:00Z
7
value 0.01893
scoring_system epss
scoring_elements 0.83184
published_at 2026-04-08T12:55:00Z
8
value 0.01893
scoring_system epss
scoring_elements 0.83191
published_at 2026-04-09T12:55:00Z
9
value 0.01893
scoring_system epss
scoring_elements 0.83207
published_at 2026-04-11T12:55:00Z
10
value 0.01893
scoring_system epss
scoring_elements 0.83201
published_at 2026-04-12T12:55:00Z
11
value 0.01893
scoring_system epss
scoring_elements 0.83197
published_at 2026-04-13T12:55:00Z
12
value 0.01893
scoring_system epss
scoring_elements 0.83233
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452651
reference_id 1452651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452651
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863212
reference_id 863212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863212
6
reference_url https://usn.ubuntu.com/3308-1/
reference_id USN-3308-1
reference_type
scores
url https://usn.ubuntu.com/3308-1/
7
reference_url https://usn.ubuntu.com/USN-4804-1/
reference_id USN-USN-4804-1
reference_type
scores
url https://usn.ubuntu.com/USN-4804-1/
fixed_packages
aliases CVE-2017-2295
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18aq-72zg-3uc9
1
url VCID-1fgf-s31g-pfac
vulnerability_id VCID-1fgf-s31g-pfac
summary foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8183.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8183
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.3593
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-24T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36026
published_at 2026-04-18T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.35974
published_at 2026-04-21T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36121
published_at 2026-04-02T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36151
published_at 2026-04-04T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.35986
published_at 2026-04-07T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36036
published_at 2026-04-08T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36059
published_at 2026-04-09T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36066
published_at 2026-04-11T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36027
published_at 2026-04-12T12:55:00Z
11
value 0.00153
scoring_system epss
scoring_elements 0.36001
published_at 2026-04-13T12:55:00Z
12
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8183
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1480886
reference_id 1480886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1480886
fixed_packages
aliases CVE-2014-8183
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fgf-s31g-pfac
2
url VCID-3j8j-qks5-m3ew
vulnerability_id VCID-3j8j-qks5-m3ew
summary foreman: privilege escalation through Organization and Locations API
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4451.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4451
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34243
published_at 2026-04-01T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34583
published_at 2026-04-02T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.3461
published_at 2026-04-04T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34477
published_at 2026-04-07T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.3452
published_at 2026-04-08T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34549
published_at 2026-04-09T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34551
published_at 2026-04-11T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34512
published_at 2026-04-12T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34488
published_at 2026-04-13T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34525
published_at 2026-04-16T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34511
published_at 2026-04-18T12:55:00Z
11
value 0.00142
scoring_system epss
scoring_elements 0.3447
published_at 2026-04-21T12:55:00Z
12
value 0.00142
scoring_system epss
scoring_elements 0.34095
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1339889
reference_id 1339889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1339889
fixed_packages
aliases CVE-2016-4451
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3j8j-qks5-m3ew
3
url VCID-3ycr-9smk-uqdc
vulnerability_id VCID-3ycr-9smk-uqdc
summary
Potential Denial of Service Vulnerability
Carefully crafted requests can cause a `SystemStackError` and potentially cause a denial of service attack.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html
5
reference_url http://openwall.com/lists/oss-security/2015/06/16/14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2015/06/16/14
6
reference_url http://rhn.redhat.com/errata/RHSA-2015-2290.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-2290.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3225
reference_id
reference_type
scores
0
value 0.10456
scoring_system epss
scoring_elements 0.93231
published_at 2026-04-09T12:55:00Z
1
value 0.10456
scoring_system epss
scoring_elements 0.93255
published_at 2026-04-18T12:55:00Z
2
value 0.10456
scoring_system epss
scoring_elements 0.93251
published_at 2026-04-16T12:55:00Z
3
value 0.10456
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-08T12:55:00Z
4
value 0.10456
scoring_system epss
scoring_elements 0.93235
published_at 2026-04-11T12:55:00Z
5
value 0.10456
scoring_system epss
scoring_elements 0.93234
published_at 2026-04-13T12:55:00Z
6
value 0.10456
scoring_system epss
scoring_elements 0.93232
published_at 2026-04-12T12:55:00Z
7
value 0.10456
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-01T12:55:00Z
8
value 0.10456
scoring_system epss
scoring_elements 0.93216
published_at 2026-04-02T12:55:00Z
9
value 0.10456
scoring_system epss
scoring_elements 0.9322
published_at 2026-04-04T12:55:00Z
10
value 0.10456
scoring_system epss
scoring_elements 0.93218
published_at 2026-04-07T12:55:00Z
11
value 0.13251
scoring_system epss
scoring_elements 0.94171
published_at 2026-04-21T12:55:00Z
12
value 0.13251
scoring_system epss
scoring_elements 0.94174
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3225
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225
10
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
11
reference_url https://github.com/rack/rack/blob/master/HISTORY.md
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/blob/master/HISTORY.md
12
reference_url https://github.com/rack/rack/commits/1.4.6
reference_id
reference_type
scores
url https://github.com/rack/rack/commits/1.4.6
13
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml
14
reference_url https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3225
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3225
16
reference_url http://www.debian.org/security/2015/dsa-3322
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3322
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1232292
reference_id 1232292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1232292
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789311
reference_id 789311
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789311
19
reference_url https://github.com/advisories/GHSA-rgr4-9jh5-j4j6
reference_id GHSA-rgr4-9jh5-j4j6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rgr4-9jh5-j4j6
20
reference_url https://access.redhat.com/errata/RHSA-2015:2290
reference_id RHSA-2015:2290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2290
fixed_packages
aliases CVE-2015-3225, GHSA-rgr4-9jh5-j4j6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ycr-9smk-uqdc
4
url VCID-4d6e-mx3k-yqgk
vulnerability_id VCID-4d6e-mx3k-yqgk
summary foreman: Information leak through organizations and locations feature
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7078.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7078
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-01T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-02T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54653
published_at 2026-04-04T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54623
published_at 2026-04-07T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54675
published_at 2026-04-08T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54671
published_at 2026-04-09T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54684
published_at 2026-04-16T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54667
published_at 2026-04-12T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54646
published_at 2026-04-13T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54686
published_at 2026-04-18T12:55:00Z
10
value 0.00316
scoring_system epss
scoring_elements 0.54665
published_at 2026-04-21T12:55:00Z
11
value 0.00316
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7078
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386244
reference_id 1386244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386244
fixed_packages
aliases CVE-2016-7078
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d6e-mx3k-yqgk
5
url VCID-6bhb-kgf4-abe7
vulnerability_id VCID-6bhb-kgf4-abe7
summary foreman: Stored XSS vulnerability in remote execution plugin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8613.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8613
reference_id
reference_type
scores
0
value 0.00737
scoring_system epss
scoring_elements 0.72779
published_at 2026-04-01T12:55:00Z
1
value 0.00737
scoring_system epss
scoring_elements 0.72786
published_at 2026-04-02T12:55:00Z
2
value 0.00737
scoring_system epss
scoring_elements 0.72806
published_at 2026-04-04T12:55:00Z
3
value 0.00737
scoring_system epss
scoring_elements 0.72783
published_at 2026-04-07T12:55:00Z
4
value 0.00737
scoring_system epss
scoring_elements 0.72821
published_at 2026-04-08T12:55:00Z
5
value 0.00737
scoring_system epss
scoring_elements 0.72835
published_at 2026-04-13T12:55:00Z
6
value 0.00737
scoring_system epss
scoring_elements 0.72859
published_at 2026-04-11T12:55:00Z
7
value 0.00737
scoring_system epss
scoring_elements 0.72843
published_at 2026-04-12T12:55:00Z
8
value 0.00737
scoring_system epss
scoring_elements 0.72876
published_at 2026-04-16T12:55:00Z
9
value 0.00737
scoring_system epss
scoring_elements 0.72886
published_at 2026-04-18T12:55:00Z
10
value 0.00737
scoring_system epss
scoring_elements 0.72879
published_at 2026-04-21T12:55:00Z
11
value 0.00737
scoring_system epss
scoring_elements 0.7292
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8613
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1387232
reference_id 1387232
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1387232
fixed_packages
aliases CVE-2016-8613
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bhb-kgf4-abe7
6
url VCID-6hub-g2ja-afaw
vulnerability_id VCID-6hub-g2ja-afaw
summary
Information disclosure vulnerability
safemode for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
references
0
reference_url http://projects.theforeman.org/issues/14635
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://projects.theforeman.org/issues/14635
1
reference_url http://rubysec.com/advisories/CVE-2016-3693
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://rubysec.com/advisories/CVE-2016-3693
2
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3693.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3693.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3693
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72702
published_at 2026-04-24T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.7257
published_at 2026-04-01T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-02T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72594
published_at 2026-04-04T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72571
published_at 2026-04-07T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-08T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-09T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72645
published_at 2026-04-11T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-12T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72617
published_at 2026-04-13T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72659
published_at 2026-04-16T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.7267
published_at 2026-04-18T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.7266
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3693
5
reference_url http://seclists.org/oss-sec/2016/q2/119
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements
url http://seclists.org/oss-sec/2016/q2/119
6
reference_url https://github.com/svenfuchs/safemode
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode
7
reference_url https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f
8
reference_url https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2
9
reference_url http://theforeman.org/security.html#2016-3693
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://theforeman.org/security.html#2016-3693
10
reference_url http://www.openwall.com/lists/oss-security/2016/04/20/8
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/04/20/8
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327471
reference_id 1327471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327471
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
13
reference_url http://rubysec.com/advisories/CVE-2016-3693/
reference_id CVE-2016-3693
reference_type
scores
url http://rubysec.com/advisories/CVE-2016-3693/
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
reference_id CVE-2016-3693
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
15
reference_url https://github.com/advisories/GHSA-c92m-rrrc-q5wf
reference_id GHSA-c92m-rrrc-q5wf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c92m-rrrc-q5wf
fixed_packages
aliases CVE-2016-3693, GHSA-c92m-rrrc-q5wf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hub-g2ja-afaw
7
url VCID-6jdw-pp1b-1qan
vulnerability_id VCID-6jdw-pp1b-1qan
summary katello-debug: Possible symlink attacks due to use of predictable file names
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9595.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9595
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12806
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12904
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12954
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12756
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12836
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12887
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12853
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12815
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.1277
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12674
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12681
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12783
published_at 2026-04-21T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9595
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406729
reference_id 1406729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406729
fixed_packages
aliases CVE-2016-9595
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jdw-pp1b-1qan
8
url VCID-6xkf-evrx-pyau
vulnerability_id VCID-6xkf-evrx-pyau
summary
Exposure of Sensitive Information to an Unauthorized Actor
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html
1
reference_url http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html
2
reference_url http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2166.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2166
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50599
published_at 2026-04-13T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50573
published_at 2026-04-24T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50625
published_at 2026-04-21T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50646
published_at 2026-04-18T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50504
published_at 2026-04-01T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5056
published_at 2026-04-02T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50588
published_at 2026-04-04T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50541
published_at 2026-04-07T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50596
published_at 2026-04-08T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50593
published_at 2026-04-09T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50635
published_at 2026-04-11T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50613
published_at 2026-04-12T12:55:00Z
12
value 0.00271
scoring_system epss
scoring_elements 0.5064
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2166
5
reference_url https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git%3Bh=a058585
reference_id
reference_type
scores
url https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git%3Bh=a058585
6
reference_url https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585
7
reference_url https://issues.apache.org/jira/browse/PROTON-1157
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/PROTON-1157
8
reference_url https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E
10
reference_url http://www.securityfocus.com/archive/1/537864/100/0/threaded
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/archive/1/537864/100/0/threaded
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1320842
reference_id 1320842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1320842
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid_proton:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:qpid_proton:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid_proton:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2166
reference_id CVE-2016-2166
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-2166
15
reference_url https://github.com/advisories/GHSA-f5cf-f7px-xpmh
reference_id GHSA-f5cf-f7px-xpmh
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-f5cf-f7px-xpmh
fixed_packages
aliases CVE-2016-2166, GHSA-f5cf-f7px-xpmh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkf-evrx-pyau
9
url VCID-7zj1-ye9x-cueu
vulnerability_id VCID-7zj1-ye9x-cueu
summary pulp: Leakage of CA key in pulp-qpid-ssl-cfg
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3696.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3696
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16633
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16806
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16863
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16648
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16732
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16786
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16766
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16723
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16666
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16611
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16649
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.1655
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3696
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1328930
reference_id 1328930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1328930
fixed_packages
aliases CVE-2016-3696
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zj1-ye9x-cueu
10
url VCID-8fnw-r4f3-xqcg
vulnerability_id VCID-8fnw-r4f3-xqcg
summary foreman: Image password leak
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0336
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2672.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2672.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2672
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38794
published_at 2026-04-01T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38672
published_at 2026-04-24T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38893
published_at 2026-04-13T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.3894
published_at 2026-04-16T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.38837
published_at 2026-04-21T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38927
published_at 2026-04-02T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38949
published_at 2026-04-04T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38879
published_at 2026-04-07T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38931
published_at 2026-04-08T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.38945
published_at 2026-04-09T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.38956
published_at 2026-04-11T12:55:00Z
11
value 0.00175
scoring_system epss
scoring_elements 0.3892
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2672
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2672
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2672
4
reference_url https://projects.theforeman.org/issues/19169
reference_id
reference_type
scores
url https://projects.theforeman.org/issues/19169
5
reference_url http://www.securityfocus.com/bid/97526
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97526
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1439537
reference_id 1439537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1439537
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-2672
reference_id CVE-2017-2672
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-2672
fixed_packages
aliases CVE-2017-2672
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fnw-r4f3-xqcg
11
url VCID-asqu-5r9h-9yav
vulnerability_id VCID-asqu-5r9h-9yav
summary
SQL Injection
An SQL injection was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14623.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14623.json
2
reference_url https://access.redhat.com/security/cve/CVE-2018-14623
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2018-14623
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14623
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33594
published_at 2026-04-11T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33347
published_at 2026-04-24T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33507
published_at 2026-04-21T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33564
published_at 2026-04-16T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33529
published_at 2026-04-13T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33553
published_at 2026-04-12T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33496
published_at 2026-04-01T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.3365
published_at 2026-04-02T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33684
published_at 2026-04-04T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33523
published_at 2026-04-07T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33567
published_at 2026-04-08T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33601
published_at 2026-04-09T12:55:00Z
12
value 0.00137
scoring_system epss
scoring_elements 0.3354
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14623
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623719
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1623719
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623
6
reference_url https://github.com/Katello/katello
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-14623.yml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-14623.yml
8
reference_url https://web.archive.org/web/20200227100255/http://www.securityfocus.com/bid/106224
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227100255/http://www.securityfocus.com/bid/106224
9
reference_url http://www.securityfocus.com/bid/106224
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106224
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14623
reference_id CVE-2018-14623
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-14623
11
reference_url https://github.com/advisories/GHSA-527r-mfmj-prqf
reference_id GHSA-527r-mfmj-prqf
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-527r-mfmj-prqf
12
reference_url https://github.com/advisories/GHSA-jx5v-788g-qw58
reference_id GHSA-jx5v-788g-qw58
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jx5v-788g-qw58
fixed_packages
aliases CVE-2018-14623, GHSA-jx5v-788g-qw58
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-asqu-5r9h-9yav
12
url VCID-avsj-f1g8-yfen
vulnerability_id VCID-avsj-f1g8-yfen
summary foreman: Persistent XSS in Foreman remote execution plugin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6319.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6319
reference_id
reference_type
scores
0
value 0.00734
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-01T12:55:00Z
1
value 0.00734
scoring_system epss
scoring_elements 0.72692
published_at 2026-04-02T12:55:00Z
2
value 0.00734
scoring_system epss
scoring_elements 0.72711
published_at 2026-04-04T12:55:00Z
3
value 0.00734
scoring_system epss
scoring_elements 0.72688
published_at 2026-04-07T12:55:00Z
4
value 0.00734
scoring_system epss
scoring_elements 0.72727
published_at 2026-04-08T12:55:00Z
5
value 0.00734
scoring_system epss
scoring_elements 0.7274
published_at 2026-04-09T12:55:00Z
6
value 0.00734
scoring_system epss
scoring_elements 0.72764
published_at 2026-04-11T12:55:00Z
7
value 0.00734
scoring_system epss
scoring_elements 0.72748
published_at 2026-04-12T12:55:00Z
8
value 0.00734
scoring_system epss
scoring_elements 0.72738
published_at 2026-04-13T12:55:00Z
9
value 0.00734
scoring_system epss
scoring_elements 0.7278
published_at 2026-04-16T12:55:00Z
10
value 0.00734
scoring_system epss
scoring_elements 0.72791
published_at 2026-04-18T12:55:00Z
11
value 0.00734
scoring_system epss
scoring_elements 0.72783
published_at 2026-04-21T12:55:00Z
12
value 0.00734
scoring_system epss
scoring_elements 0.72824
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6319
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1365815
reference_id 1365815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1365815
fixed_packages
aliases CVE-2016-6319
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avsj-f1g8-yfen
13
url VCID-bvrv-wvt6-8yfy
vulnerability_id VCID-bvrv-wvt6-8yfy
summary
Improper Certificate Validation
Hammer CLI, a CLI utility for Foreman, does not explicitly set the `verify_ssl` flag for `apipie-bindings`. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks.
references
0
reference_url http://projects.theforeman.org/issues/19033
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://projects.theforeman.org/issues/19033
1
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2667.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2667.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2667
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29272
published_at 2026-04-24T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29496
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29564
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29612
published_at 2026-04-04T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29433
published_at 2026-04-07T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29535
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29538
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29494
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29442
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29434
published_at 2026-04-18T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2667
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1436262
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1436262
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hammer_cli_foreman/CVE-2017-2667.yml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hammer_cli_foreman/CVE-2017-2667.yml
6
reference_url https://github.com/theforeman/hammer-cli-foreman
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/theforeman/hammer-cli-foreman
7
reference_url https://web.archive.org/web/20200227181720/http://www.securityfocus.com/bid/97153
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227181720/http://www.securityfocus.com/bid/97153
8
reference_url http://www.securityfocus.com/bid/97153
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/97153
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-2667
reference_id CVE-2017-2667
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-2667
10
reference_url https://github.com/advisories/GHSA-77h8-xr85-3x5q
reference_id GHSA-77h8-xr85-3x5q
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-77h8-xr85-3x5q
fixed_packages
aliases CVE-2017-2667, GHSA-77h8-xr85-3x5q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvrv-wvt6-8yfy
14
url VCID-cc8z-r1zy-23f2
vulnerability_id VCID-cc8z-r1zy-23f2
summary foreman: Information disclosure in provisioning template previews
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4995.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4995.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4995
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53142
published_at 2026-04-01T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53166
published_at 2026-04-02T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53191
published_at 2026-04-04T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53159
published_at 2026-04-07T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53212
published_at 2026-04-08T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53206
published_at 2026-04-09T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53257
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53243
published_at 2026-04-12T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53226
published_at 2026-04-13T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53263
published_at 2026-04-16T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53269
published_at 2026-04-18T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.53249
published_at 2026-04-21T12:55:00Z
12
value 0.00298
scoring_system epss
scoring_elements 0.53219
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4995
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348939
reference_id 1348939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348939
fixed_packages
aliases CVE-2016-4995
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc8z-r1zy-23f2
15
url VCID-dfb9-31gj-57fs
vulnerability_id VCID-dfb9-31gj-57fs
summary foreman: Stored XSS in org/loc wizard
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8634.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8634
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55554
published_at 2026-04-01T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-02T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55688
published_at 2026-04-04T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55667
published_at 2026-04-07T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55718
published_at 2026-04-08T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55721
published_at 2026-04-09T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.5573
published_at 2026-04-11T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.5571
published_at 2026-04-12T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55693
published_at 2026-04-13T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-16T12:55:00Z
10
value 0.00328
scoring_system epss
scoring_elements 0.55737
published_at 2026-04-18T12:55:00Z
11
value 0.00328
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-21T12:55:00Z
12
value 0.00328
scoring_system epss
scoring_elements 0.5564
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8634
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391520
reference_id 1391520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391520
fixed_packages
aliases CVE-2016-8634
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfb9-31gj-57fs
16
url VCID-dh5x-wb2a-1ufj
vulnerability_id VCID-dh5x-wb2a-1ufj
summary
XSS vulnerabiliy in generated pagination links
The package will_paginate generate pagination links without escaping result. If user-controlled data is sent to will_paginate, there is a potential XSS vulnerability.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6459.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6459.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6459
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.49103
published_at 2026-04-11T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49076
published_at 2026-04-12T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49125
published_at 2026-04-18T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49127
published_at 2026-04-16T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49079
published_at 2026-04-24T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49093
published_at 2026-04-21T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49089
published_at 2026-04-08T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.49082
published_at 2026-04-13T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49086
published_at 2026-04-09T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.582
published_at 2026-04-07T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58119
published_at 2026-04-01T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58205
published_at 2026-04-02T12:55:00Z
12
value 0.00361
scoring_system epss
scoring_elements 0.58225
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6459
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6459
4
reference_url https://github.com/mislav/will_paginate
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mislav/will_paginate
5
reference_url https://github.com/mislav/will_paginate/releases/tag/v3.0.5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mislav/will_paginate/releases/tag/v3.0.5
6
reference_url https://groups.google.com/forum/#!topic/will_paginate/Dguinf-5Sbw
reference_id
reference_type
scores
url https://groups.google.com/forum/#!topic/will_paginate/Dguinf-5Sbw
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-6459
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-6459
8
reference_url https://web.archive.org/web/20150709163604/http://www.securityfocus.com/bid/64509
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20150709163604/http://www.securityfocus.com/bid/64509
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1046642
reference_id 1046642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1046642
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733209
reference_id 733209
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733209
11
reference_url https://github.com/advisories/GHSA-8r6h-7x9g-xmw9
reference_id GHSA-8r6h-7x9g-xmw9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8r6h-7x9g-xmw9
fixed_packages
aliases CVE-2013-6459, GHSA-8r6h-7x9g-xmw9, OSV-101138
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5x-wb2a-1ufj
17
url VCID-dtva-ze8n-vycd
vulnerability_id VCID-dtva-ze8n-vycd
summary foreman: inside discovery-debug, the root password is displayed in plaintext
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4996.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4996
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.1207
published_at 2026-04-01T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1218
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12028
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.1211
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12161
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12169
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12132
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.121
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.11968
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12085
published_at 2026-04-21T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12064
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4996
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1349136
reference_id 1349136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1349136
fixed_packages
aliases CVE-2016-4996
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtva-ze8n-vycd
18
url VCID-e488-4fjn-z3g2
vulnerability_id VCID-e488-4fjn-z3g2
summary foreman: Foreman information leak through unauthorized multiple_checkboxes helper
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7077.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7077
reference_id
reference_type
scores
0
value 0.00251
scoring_system epss
scoring_elements 0.48346
published_at 2026-04-01T12:55:00Z
1
value 0.00251
scoring_system epss
scoring_elements 0.48381
published_at 2026-04-02T12:55:00Z
2
value 0.00251
scoring_system epss
scoring_elements 0.48402
published_at 2026-04-04T12:55:00Z
3
value 0.00251
scoring_system epss
scoring_elements 0.48355
published_at 2026-04-07T12:55:00Z
4
value 0.00251
scoring_system epss
scoring_elements 0.4841
published_at 2026-04-08T12:55:00Z
5
value 0.00251
scoring_system epss
scoring_elements 0.48404
published_at 2026-04-09T12:55:00Z
6
value 0.00251
scoring_system epss
scoring_elements 0.48428
published_at 2026-04-11T12:55:00Z
7
value 0.00251
scoring_system epss
scoring_elements 0.48403
published_at 2026-04-12T12:55:00Z
8
value 0.00251
scoring_system epss
scoring_elements 0.48415
published_at 2026-04-21T12:55:00Z
9
value 0.00251
scoring_system epss
scoring_elements 0.48465
published_at 2026-04-16T12:55:00Z
10
value 0.00251
scoring_system epss
scoring_elements 0.4846
published_at 2026-04-18T12:55:00Z
11
value 0.00251
scoring_system epss
scoring_elements 0.484
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7077
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1385777
reference_id 1385777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1385777
fixed_packages
aliases CVE-2016-7077
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e488-4fjn-z3g2
19
url VCID-egve-f1uw-nfff
vulnerability_id VCID-egve-f1uw-nfff
summary foreman-debug: missing obfuscation of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9593.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9593
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44351
published_at 2026-04-01T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44437
published_at 2026-04-12T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44458
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44394
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44445
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44452
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44468
published_at 2026-04-11T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44436
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44493
published_at 2026-04-16T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44483
published_at 2026-04-18T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44413
published_at 2026-04-21T12:55:00Z
11
value 0.00218
scoring_system epss
scoring_elements 0.44312
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9593
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406384
reference_id 1406384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406384
fixed_packages
aliases CVE-2016-9593
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egve-f1uw-nfff
20
url VCID-kra9-9yr7-nbg6
vulnerability_id VCID-kra9-9yr7-nbg6
summary Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15699.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15699
reference_id
reference_type
scores
0
value 0.01602
scoring_system epss
scoring_elements 0.81637
published_at 2026-04-01T12:55:00Z
1
value 0.01602
scoring_system epss
scoring_elements 0.81649
published_at 2026-04-02T12:55:00Z
2
value 0.01602
scoring_system epss
scoring_elements 0.81671
published_at 2026-04-04T12:55:00Z
3
value 0.01602
scoring_system epss
scoring_elements 0.81669
published_at 2026-04-07T12:55:00Z
4
value 0.01602
scoring_system epss
scoring_elements 0.81695
published_at 2026-04-08T12:55:00Z
5
value 0.01602
scoring_system epss
scoring_elements 0.817
published_at 2026-04-13T12:55:00Z
6
value 0.01602
scoring_system epss
scoring_elements 0.81719
published_at 2026-04-11T12:55:00Z
7
value 0.01602
scoring_system epss
scoring_elements 0.81707
published_at 2026-04-12T12:55:00Z
8
value 0.01602
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-18T12:55:00Z
9
value 0.01602
scoring_system epss
scoring_elements 0.81742
published_at 2026-04-21T12:55:00Z
10
value 0.01602
scoring_system epss
scoring_elements 0.81767
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15699
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1512724
reference_id 1512724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1512724
fixed_packages
aliases CVE-2017-15699
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kra9-9yr7-nbg6
21
url VCID-p8ab-a4gk-eyd2
vulnerability_id VCID-p8ab-a4gk-eyd2
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1080.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2017-0002.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0002.html
7
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0336
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1669.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1669.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1669
reference_id
reference_type
scores
0
value 0.01626
scoring_system epss
scoring_elements 0.81796
published_at 2026-04-01T12:55:00Z
1
value 0.01626
scoring_system epss
scoring_elements 0.81923
published_at 2026-04-24T12:55:00Z
2
value 0.01626
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-13T12:55:00Z
3
value 0.01626
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-18T12:55:00Z
4
value 0.01626
scoring_system epss
scoring_elements 0.819
published_at 2026-04-21T12:55:00Z
5
value 0.01626
scoring_system epss
scoring_elements 0.81807
published_at 2026-04-02T12:55:00Z
6
value 0.01626
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-04T12:55:00Z
7
value 0.01626
scoring_system epss
scoring_elements 0.81827
published_at 2026-04-07T12:55:00Z
8
value 0.01626
scoring_system epss
scoring_elements 0.81853
published_at 2026-04-08T12:55:00Z
9
value 0.01626
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-09T12:55:00Z
10
value 0.01626
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-11T12:55:00Z
11
value 0.01626
scoring_system epss
scoring_elements 0.81867
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1669
10
reference_url https://codereview.chromium.org/1945313002
reference_id
reference_type
scores
url https://codereview.chromium.org/1945313002
11
reference_url https://crbug.com/606115
reference_id
reference_type
scores
url https://crbug.com/606115
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
41
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
42
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
44
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
45
reference_url http://www.debian.org/security/2016/dsa-3590
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3590
46
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
47
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
48
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335449
reference_id 1335449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335449
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1669
reference_id CVE-2016-1669
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1669
61
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
62
reference_url https://access.redhat.com/errata/RHSA-2016:1080
reference_id RHSA-2016:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1080
63
reference_url https://access.redhat.com/errata/RHSA-2017:0002
reference_id RHSA-2017:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0002
64
reference_url https://access.redhat.com/errata/RHSA-2017:0879
reference_id RHSA-2017:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0879
65
reference_url https://access.redhat.com/errata/RHSA-2017:0880
reference_id RHSA-2017:0880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0880
66
reference_url https://access.redhat.com/errata/RHSA-2017:0881
reference_id RHSA-2017:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0881
67
reference_url https://access.redhat.com/errata/RHSA-2017:0882
reference_id RHSA-2017:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0882
68
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1669
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8ab-a4gk-eyd2
22
url VCID-ph9r-qphf-8fam
vulnerability_id VCID-ph9r-qphf-8fam
summary pulp: Unsafe use of bash $RANDOM for NSS DB password and seed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3704.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3704
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67647
published_at 2026-04-01T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67682
published_at 2026-04-07T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67702
published_at 2026-04-04T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67734
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-09T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67771
published_at 2026-04-11T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67757
published_at 2026-04-12T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67724
published_at 2026-04-13T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.6776
published_at 2026-04-16T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67772
published_at 2026-04-24T12:55:00Z
10
value 0.00543
scoring_system epss
scoring_elements 0.67753
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3704
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1330264
reference_id 1330264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1330264
fixed_packages
aliases CVE-2016-3704
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph9r-qphf-8fam
23
url VCID-sa68-rwqe-tfgp
vulnerability_id VCID-sa68-rwqe-tfgp
summary foreman: Stored XSS via organization/location with HTML in name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8639.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8639
reference_id
reference_type
scores
0
value 0.00582
scoring_system epss
scoring_elements 0.68875
published_at 2026-04-01T12:55:00Z
1
value 0.00582
scoring_system epss
scoring_elements 0.68893
published_at 2026-04-02T12:55:00Z
2
value 0.00582
scoring_system epss
scoring_elements 0.68914
published_at 2026-04-04T12:55:00Z
3
value 0.00582
scoring_system epss
scoring_elements 0.68894
published_at 2026-04-07T12:55:00Z
4
value 0.00582
scoring_system epss
scoring_elements 0.68944
published_at 2026-04-08T12:55:00Z
5
value 0.00582
scoring_system epss
scoring_elements 0.68963
published_at 2026-04-09T12:55:00Z
6
value 0.00582
scoring_system epss
scoring_elements 0.68986
published_at 2026-04-11T12:55:00Z
7
value 0.00582
scoring_system epss
scoring_elements 0.68971
published_at 2026-04-12T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.68941
published_at 2026-04-13T12:55:00Z
9
value 0.00582
scoring_system epss
scoring_elements 0.68983
published_at 2026-04-16T12:55:00Z
10
value 0.00582
scoring_system epss
scoring_elements 0.68993
published_at 2026-04-18T12:55:00Z
11
value 0.00582
scoring_system epss
scoring_elements 0.68972
published_at 2026-04-21T12:55:00Z
12
value 0.00582
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8639
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1393291
reference_id 1393291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1393291
fixed_packages
aliases CVE-2016-8639
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sa68-rwqe-tfgp
24
url VCID-va8w-uzhc-x3bz
vulnerability_id VCID-va8w-uzhc-x3bz
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6668
reference_id
reference_type
scores
0
value 0.1282
scoring_system epss
scoring_elements 0.93988
published_at 2026-04-01T12:55:00Z
1
value 0.1282
scoring_system epss
scoring_elements 0.93998
published_at 2026-04-02T12:55:00Z
2
value 0.1282
scoring_system epss
scoring_elements 0.94006
published_at 2026-04-04T12:55:00Z
3
value 0.1282
scoring_system epss
scoring_elements 0.94009
published_at 2026-04-07T12:55:00Z
4
value 0.1282
scoring_system epss
scoring_elements 0.94018
published_at 2026-04-08T12:55:00Z
5
value 0.1282
scoring_system epss
scoring_elements 0.94022
published_at 2026-04-09T12:55:00Z
6
value 0.1282
scoring_system epss
scoring_elements 0.94027
published_at 2026-04-13T12:55:00Z
7
value 0.1282
scoring_system epss
scoring_elements 0.94042
published_at 2026-04-16T12:55:00Z
8
value 0.1282
scoring_system epss
scoring_elements 0.94048
published_at 2026-04-18T12:55:00Z
9
value 0.1282
scoring_system epss
scoring_elements 0.94047
published_at 2026-04-21T12:55:00Z
10
value 0.1282
scoring_system epss
scoring_elements 0.94049
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6653
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6654
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6655
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6656
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6657
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6658
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6659
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6660
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6661
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6664
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6665
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6666
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6667
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1700
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1701
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1702
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1703
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1704
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1705
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1713
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1715
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1074737
reference_id 1074737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1074737
26
reference_url https://security.gentoo.org/glsa/201403-01
reference_id GLSA-201403-01
reference_type
scores
url https://security.gentoo.org/glsa/201403-01
27
reference_url https://access.redhat.com/errata/RHSA-2014:1744
reference_id RHSA-2014:1744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1744
fixed_packages
aliases CVE-2013-6668
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va8w-uzhc-x3bz
Fixing_vulnerabilities
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-access-insights-puppet@0.0.9-2%3Farch=el7sat