Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/108765?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/108765?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-754?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-754", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85755?format=api", "vulnerability_id": "VCID-1yjm-d71x-9fh4", "summary": "kernel: AIO write triggers integer overflow in some protocols", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b" }, { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17849", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17884", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18036", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.182", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18253", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.181", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18015", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17968", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17908", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8830" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" }, { "reference_url": "https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b" }, { "reference_url": "https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3503" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/02/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/02/9" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2968-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2968-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2968-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2968-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2969-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2969-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2970-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2970-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275", "reference_id": "1314275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830", "reference_id": "CVE-2015-8830", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3083", "reference_id": "RHSA-2018:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3096", "reference_id": "RHSA-2018:3096", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "reference_url": "https://usn.ubuntu.com/2968-1/", "reference_id": "USN-2968-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2968-1/" }, { "reference_url": "https://usn.ubuntu.com/2968-2/", "reference_id": "USN-2968-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2968-2/" }, { "reference_url": "https://usn.ubuntu.com/2969-1/", "reference_id": "USN-2969-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2969-1/" }, { "reference_url": "https://usn.ubuntu.com/2970-1/", "reference_id": "USN-2970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2970-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8830" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yjm-d71x-9fh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84481?format=api", "vulnerability_id": "VCID-45qw-a51e-8kcp", "summary": "kernel: net/packet: overflow in check for priv area size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.9943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99441", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99437", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99439", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.9944", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99434", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.87", "scoring_system": "epss", "scoring_elements": "0.99436", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7308" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html" }, { "reference_url": "https://patchwork.ozlabs.org/patch/744811/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/744811/" }, { "reference_url": "https://patchwork.ozlabs.org/patch/744812/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/744812/" }, { "reference_url": "https://patchwork.ozlabs.org/patch/744813/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/744813/" }, { "reference_url": "https://source.android.com/security/bulletin/2017-07-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-07-01" }, { "reference_url": "https://www.exploit-db.com/exploits/41994/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/41994/" }, { "reference_url": "https://www.exploit-db.com/exploits/44654/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44654/" }, { "reference_url": "http://www.securityfocus.com/bid/97234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97234" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404", "reference_id": "1437404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308", "reference_id": "CVE-2017-7308", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb", "reference_id": "CVE-2017-7308", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1297", "reference_id": "RHSA-2017:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1298", "reference_id": "RHSA-2017:1298", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1298" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308", "reference_id": "RHSA-2017:1308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3256-1/", "reference_id": "USN-3256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3256-1/" }, { "reference_url": "https://usn.ubuntu.com/3256-2/", "reference_id": "USN-3256-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3256-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7308" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45qw-a51e-8kcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82840?format=api", "vulnerability_id": "VCID-49zh-3frn-pybg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688", "reference_id": "1452688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9076" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49zh-3frn-pybg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82842?format=api", "vulnerability_id": "VCID-4brq-uc34-uyb1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.7551", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75542", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75576", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76529", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76502", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744", "reference_id": "1452744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9077" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4brq-uc34-uyb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4149?format=api", "vulnerability_id": "VCID-75hg-p8uc-p7ex", "summary": "Speculative Store Bypass", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.39422", "scoring_system": "epss", "scoring_elements": "0.97277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.39422", "scoring_system": "epss", "scoring_elements": "0.97282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.39422", "scoring_system": "epss", "scoring_elements": "0.97272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97629", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97631", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97632", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97642", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97641", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97647", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97619", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.46015", "scoring_system": "epss", "scoring_elements": "0.97627", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890", "reference_id": "1566890", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "reference_id": "CVE-2018-3639", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c", "reference_id": "CVE-2018-3639", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1629", "reference_id": "RHSA-2018:1629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1630", "reference_id": "RHSA-2018:1630", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1632", "reference_id": "RHSA-2018:1632", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1633", "reference_id": "RHSA-2018:1633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1635", "reference_id": "RHSA-2018:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1636", "reference_id": "RHSA-2018:1636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1637", "reference_id": "RHSA-2018:1637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1638", "reference_id": "RHSA-2018:1638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1639", "reference_id": "RHSA-2018:1639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1640", "reference_id": "RHSA-2018:1640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1641", "reference_id": "RHSA-2018:1641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1642", "reference_id": "RHSA-2018:1642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643", "reference_id": "RHSA-2018:1643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644", "reference_id": "RHSA-2018:1644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645", "reference_id": "RHSA-2018:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646", "reference_id": "RHSA-2018:1646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1647", "reference_id": "RHSA-2018:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1648", "reference_id": "RHSA-2018:1648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1649", "reference_id": "RHSA-2018:1649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1650", "reference_id": "RHSA-2018:1650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1651", "reference_id": "RHSA-2018:1651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1652", "reference_id": "RHSA-2018:1652", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1653", "reference_id": "RHSA-2018:1653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1654", "reference_id": "RHSA-2018:1654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1655", "reference_id": "RHSA-2018:1655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1656", "reference_id": "RHSA-2018:1656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1657", "reference_id": "RHSA-2018:1657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1658", "reference_id": "RHSA-2018:1658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1659", "reference_id": "RHSA-2018:1659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1660", "reference_id": "RHSA-2018:1660", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1661", "reference_id": "RHSA-2018:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1662", "reference_id": "RHSA-2018:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1663", "reference_id": "RHSA-2018:1663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1664", "reference_id": "RHSA-2018:1664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1665", "reference_id": "RHSA-2018:1665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1666", "reference_id": "RHSA-2018:1666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1667", "reference_id": "RHSA-2018:1667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1668", "reference_id": "RHSA-2018:1668", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1669", "reference_id": "RHSA-2018:1669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1674", "reference_id": "RHSA-2018:1674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1675", "reference_id": "RHSA-2018:1675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1676", "reference_id": "RHSA-2018:1676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1686", "reference_id": "RHSA-2018:1686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1688", "reference_id": "RHSA-2018:1688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1689", "reference_id": "RHSA-2018:1689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1690", "reference_id": "RHSA-2018:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1696", "reference_id": "RHSA-2018:1696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1710", "reference_id": "RHSA-2018:1710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1711", "reference_id": "RHSA-2018:1711", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1737", "reference_id": "RHSA-2018:1737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1738", "reference_id": "RHSA-2018:1738", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1826", "reference_id": "RHSA-2018:1826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1965", "reference_id": "RHSA-2018:1965", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967", "reference_id": "RHSA-2018:1967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1997", "reference_id": "RHSA-2018:1997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2001", "reference_id": "RHSA-2018:2001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2003", "reference_id": "RHSA-2018:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2006", "reference_id": "RHSA-2018:2006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2060", "reference_id": "RHSA-2018:2060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2161", "reference_id": "RHSA-2018:2161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162", "reference_id": "RHSA-2018:2162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2164", "reference_id": "RHSA-2018:2164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2171", "reference_id": "RHSA-2018:2171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2172", "reference_id": "RHSA-2018:2172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2216", "reference_id": "RHSA-2018:2216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2228", "reference_id": "RHSA-2018:2228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2246", "reference_id": "RHSA-2018:2246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2250", "reference_id": "RHSA-2018:2250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2258", "reference_id": "RHSA-2018:2258", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2289", "reference_id": "RHSA-2018:2289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2309", "reference_id": "RHSA-2018:2309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2328", "reference_id": "RHSA-2018:2328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2363", "reference_id": "RHSA-2018:2363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2364", "reference_id": "RHSA-2018:2364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387", "reference_id": "RHSA-2018:2387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394", "reference_id": "RHSA-2018:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396", "reference_id": "RHSA-2018:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2948", "reference_id": "RHSA-2018:2948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3396", "reference_id": "RHSA-2018:3396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3397", "reference_id": "RHSA-2018:3397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3398", "reference_id": "RHSA-2018:3398", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3399", "reference_id": "RHSA-2018:3399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3400", "reference_id": "RHSA-2018:3400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3401", "reference_id": "RHSA-2018:3401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3402", "reference_id": "RHSA-2018:3402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3407", "reference_id": "RHSA-2018:3407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3423", "reference_id": "RHSA-2018:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3424", "reference_id": "RHSA-2018:3424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3425", "reference_id": "RHSA-2018:3425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0148", "reference_id": "RHSA-2019:0148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1046", "reference_id": "RHSA-2019:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "reference_url": "https://usn.ubuntu.com/3651-1/", "reference_id": "USN-3651-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3651-1/" }, { "reference_url": "https://usn.ubuntu.com/3652-1/", "reference_id": "USN-3652-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3652-1/" }, { "reference_url": "https://usn.ubuntu.com/3653-1/", "reference_id": "USN-3653-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3653-1/" }, { "reference_url": "https://usn.ubuntu.com/3653-2/", "reference_id": "USN-3653-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3653-2/" }, { "reference_url": "https://usn.ubuntu.com/3654-1/", "reference_id": "USN-3654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-1/" }, { "reference_url": "https://usn.ubuntu.com/3654-2/", "reference_id": "USN-3654-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-2/" }, { "reference_url": "https://usn.ubuntu.com/3655-1/", "reference_id": "USN-3655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3655-1/" }, { "reference_url": "https://usn.ubuntu.com/3655-2/", "reference_id": "USN-3655-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3655-2/" }, { "reference_url": "https://usn.ubuntu.com/3679-1/", "reference_id": "USN-3679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3679-1/" }, { "reference_url": "https://usn.ubuntu.com/3680-1/", "reference_id": "USN-3680-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3680-1/" }, { "reference_url": "https://usn.ubuntu.com/3756-1/", "reference_id": "USN-3756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3756-1/" }, { "reference_url": "https://usn.ubuntu.com/3777-3/", "reference_id": "USN-3777-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3777-3/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-263.html", "reference_id": "XSA-263", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-263.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-3639", "XSA-263" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75hg-p8uc-p7ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63411?format=api", "vulnerability_id": "VCID-8pqu-nssu-7qav", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08954", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08977", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09024", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08973", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08853", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3945" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/04/16/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/4" }, { "reference_url": "http://www.securityfocus.com/bid/97690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493", "reference_id": "1444493", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889", "reference_id": "CVE-2017-7889", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7889" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pqu-nssu-7qav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83946?format=api", "vulnerability_id": "VCID-a6md-wqt8-cbhh", "summary": "kernel: memory leak when merging buffers in SCSI IO vectors", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058" }, { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22523", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22533", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22525", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26069", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25947", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" }, { "reference_url": "http://seclists.org/oss-sec/2017/q4/52", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2017/q4/52" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:M/C:N/I:N/A:C" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058" }, { "reference_url": "https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K93472064?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8" }, { "reference_url": "http://www.securityfocus.com/bid/101911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101911" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089", "reference_id": "1495089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190", "reference_id": "CVE-2017-12190", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0654", "reference_id": "RHSA-2018:0654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://usn.ubuntu.com/3487-1/", "reference_id": "USN-3487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3487-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-1/", "reference_id": "USN-3582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3582-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-2/", "reference_id": "USN-3582-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3582-2/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-12190" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6md-wqt8-cbhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63461?format=api", "vulnerability_id": "VCID-bquu-fuhh-7qha", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18876", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18765", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25303", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25208", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25207", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25289", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5803" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "reference_url": "https://secuniaresearch.flexerasoftware.com/advisories/81331/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://secuniaresearch.flexerasoftware.com/advisories/81331/" }, { "reference_url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "reference_url": "https://www.spinics.net/lists/linux-sctp/msg07036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.spinics.net/lists/linux-sctp/msg07036.html" }, { "reference_url": "https://www.spinics.net/lists/netdev/msg482523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.spinics.net/lists/netdev/msg482523.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051", "reference_id": "1551051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803", "reference_id": "CVE-2018-5803", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2948", "reference_id": "RHSA-2018:2948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3083", "reference_id": "RHSA-2018:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3096", "reference_id": "RHSA-2018:3096", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0641", "reference_id": "RHSA-2019:0641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0641" }, { "reference_url": "https://usn.ubuntu.com/3654-1/", "reference_id": "USN-3654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-1/" }, { "reference_url": "https://usn.ubuntu.com/3654-2/", "reference_id": "USN-3654-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-2/" }, { "reference_url": "https://usn.ubuntu.com/3656-1/", "reference_id": "USN-3656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3656-1/" }, { "reference_url": "https://usn.ubuntu.com/3697-1/", "reference_id": "USN-3697-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3697-1/" }, { "reference_url": "https://usn.ubuntu.com/3697-2/", "reference_id": "USN-3697-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3697-2/" }, { "reference_url": "https://usn.ubuntu.com/3698-1/", "reference_id": "USN-3698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-1/" }, { "reference_url": "https://usn.ubuntu.com/3698-2/", "reference_id": "USN-3698-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-5803" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bquu-fuhh-7qha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83613?format=api", "vulnerability_id": "VCID-fbz3-mvsn-b7fu", "summary": "kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13999", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13842", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13904", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13936", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1391", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14072", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13984", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13832", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1130" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "reference_url": "https://marc.info/?l=linux-netdev&m=152036596825220&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://marc.info/?l=linux-netdev&m=152036596825220&w=2" }, { "reference_url": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94", "reference_id": "", "reference_type": "", "scores": [], "url": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419", "reference_id": "1576419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130", "reference_id": "CVE-2018-1130", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3083", "reference_id": "RHSA-2018:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3096", "reference_id": "RHSA-2018:3096", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "reference_url": "https://usn.ubuntu.com/3654-1/", "reference_id": "USN-3654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-1/" }, { "reference_url": "https://usn.ubuntu.com/3654-2/", "reference_id": "USN-3654-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3654-2/" }, { "reference_url": "https://usn.ubuntu.com/3656-1/", "reference_id": "USN-3656-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3656-1/" }, { "reference_url": "https://usn.ubuntu.com/3697-1/", "reference_id": "USN-3697-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3697-1/" }, { "reference_url": "https://usn.ubuntu.com/3697-2/", "reference_id": "USN-3697-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3697-2/" }, { "reference_url": "https://usn.ubuntu.com/3698-1/", "reference_id": "USN-3698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-1/" }, { "reference_url": "https://usn.ubuntu.com/3698-2/", "reference_id": "USN-3698-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3698-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-1130" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fbz3-mvsn-b7fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84469?format=api", "vulnerability_id": "VCID-h53k-m5pj-83ha", "summary": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25072", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25083", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25074", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24973", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24928", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62" }, { "reference_url": "https://source.android.com/security/bulletin/2017-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-09-01" }, { "reference_url": "http://www.securityfocus.com/bid/97527", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97527" }, { "reference_url": "http://www.securitytracker.com/id/1038503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038503" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088", "reference_id": "1441088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616", "reference_id": "CVE-2017-7616", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3291-1/", "reference_id": "USN-3291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-1/" }, { "reference_url": "https://usn.ubuntu.com/3291-2/", "reference_id": "USN-3291-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-2/" }, { "reference_url": "https://usn.ubuntu.com/3291-3/", "reference_id": "USN-3291-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-3/" }, { "reference_url": "https://usn.ubuntu.com/3293-1/", "reference_id": "USN-3293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3293-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-1/", "reference_id": "USN-3406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-2/", "reference_id": "USN-3406-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7616" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h53k-m5pj-83ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63449?format=api", "vulnerability_id": "VCID-kadh-crsg-vkhg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16804", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16702", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16575", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16541", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811", "reference_id": "1550811", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4154", "reference_id": "RHSA-2019:4154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4154" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3653-1/", "reference_id": "USN-3653-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3653-1/" }, { "reference_url": "https://usn.ubuntu.com/3653-2/", "reference_id": "USN-3653-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3653-2/" }, { "reference_url": "https://usn.ubuntu.com/3655-1/", "reference_id": "USN-3655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3655-1/" }, { "reference_url": "https://usn.ubuntu.com/3655-2/", "reference_id": "USN-3655-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3655-2/" }, { "reference_url": "https://usn.ubuntu.com/3657-1/", "reference_id": "USN-3657-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3657-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-18203" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kadh-crsg-vkhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82832?format=api", "vulnerability_id": "VCID-kehv-3zaj-mbhd", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60865", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60887", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6086", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64813", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.648", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://source.android.com/security/bulletin/2017-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-09-01" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3886", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "reference_url": "http://www.securityfocus.com/bid/98562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/98562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972", "reference_id": "1450972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890", "reference_id": "CVE-2017-8890", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-8890" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kehv-3zaj-mbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83819?format=api", "vulnerability_id": "VCID-kgdm-euqp-8uac", "summary": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21044", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21217", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21193", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21066", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21267", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21207", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.f5.com/csp/article/K42142782?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K42142782?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "http://www.securityfocus.com/bid/102128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102128" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893", "reference_id": "1520893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121", "reference_id": "CVE-2017-15121", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0676", "reference_id": "RHSA-2018:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "fixed_packages": [], "aliases": [ "CVE-2017-15121" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgdm-euqp-8uac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84494?format=api", "vulnerability_id": "VCID-mpgy-hb3y-1kg8", "summary": "kernel: ping socket / AF_LLC connect() sin_family race", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2017/04/04/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/04/04/8" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49988", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.5002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49994", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.4999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49941", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50007", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc" }, { "reference_url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://twitter.com/danieljiang0415/status/845116665184497664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://twitter.com/danieljiang0415/status/845116665184497664" }, { "reference_url": "https://www.exploit-db.com/exploits/42135/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/42135/" }, { "reference_url": "http://www.securityfocus.com/bid/97407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97407" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649", "reference_id": "1436649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671", "reference_id": "CVE-2017-2671", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2671" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpgy-hb3y-1kg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87072?format=api", "vulnerability_id": "VCID-nrah-gy1h-gffv", "summary": "kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a70b52ec1aaeaf60f4739edb1b422827cb6f3893", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a70b52ec1aaeaf60f4739edb1b422827cb6f3893" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6701.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6701.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25029", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25085", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25073", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25365", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.2523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25176", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25144", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/a70b52ec1aaeaf60f4739edb1b422827cb6f3893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a70b52ec1aaeaf60f4739edb1b422827cb6f3893" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/02/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/02/9" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288", "reference_id": "1314288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701", "reference_id": "CVE-2012-6701", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6701" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrah-gy1h-gffv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84767?format=api", "vulnerability_id": "VCID-pmgn-pun5-xbch", "summary": "kernel: Null pointer dereference via keyctl", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13583", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13708", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13677", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1372", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.137", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187", "reference_id": "1395187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0931", "reference_id": "RHSA-2017:0931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0933", "reference_id": "RHSA-2017:0933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8650" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmgn-pun5-xbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82194?format=api", "vulnerability_id": "VCID-qmfy-8xcx-b3e6", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29851", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30107", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30035", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.2992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3015", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825", "reference_id": "1422825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825" }, { "reference_url": "https://security.archlinux.org/AVG-187", "reference_id": "AVG-187", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-187" }, { "reference_url": "https://security.archlinux.org/AVG-188", "reference_id": "AVG-188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6001" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmfy-8xcx-b3e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82839?format=api", "vulnerability_id": "VCID-xd6f-766q-mkh8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691", "reference_id": "1452691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9075" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6f-766q-mkh8" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-754%3Farch=el6" }