Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/111544?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/111544?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-693?arch=el7", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "3.10.0-693", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85117?format=api", "vulnerability_id": "VCID-25tv-dd91-wffh", "summary": "kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16595", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16579", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16467", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938", "reference_id": "1368938", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3146-1/", "reference_id": "USN-3146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-1/" }, { "reference_url": "https://usn.ubuntu.com/3146-2/", "reference_id": "USN-3146-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-2/" }, { "reference_url": "https://usn.ubuntu.com/3147-1/", "reference_id": "USN-3147-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3147-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7097" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25tv-dd91-wffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84362?format=api", "vulnerability_id": "VCID-2nwr-4qy5-j7a5", "summary": "kernel: ext4: power failure during write(2) causes on-disk information leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16077", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16225", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16168", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16101", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16049", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16088", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15978", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450261", "reference_id": "1450261", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3405-1/", "reference_id": "USN-3405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3405-1/" }, { "reference_url": "https://usn.ubuntu.com/3405-2/", "reference_id": "USN-3405-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3405-2/" }, { "reference_url": "https://usn.ubuntu.com/3406-1/", "reference_id": "USN-3406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-2/", "reference_id": "USN-3406-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7495" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nwr-4qy5-j7a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82840?format=api", "vulnerability_id": "VCID-49zh-3frn-pybg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688", "reference_id": "1452688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9076" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49zh-3frn-pybg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82842?format=api", "vulnerability_id": "VCID-4brq-uc34-uyb1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.7551", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75576", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75542", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76529", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76498", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744", "reference_id": "1452744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9077" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4brq-uc34-uyb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82703?format=api", "vulnerability_id": "VCID-4prt-5e6y-nkfb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22517", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22716", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22526", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22827", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22773", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404924", "reference_id": "1404924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404924" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3822-1/", "reference_id": "USN-3822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-1/" }, { "reference_url": "https://usn.ubuntu.com/3822-2/", "reference_id": "USN-3822-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9588" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4prt-5e6y-nkfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82193?format=api", "vulnerability_id": "VCID-5r82-gqnd-9yac", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82562", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82602", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82623", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82634", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421638", "reference_id": "1421638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3265-1/", "reference_id": "USN-3265-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-1/" }, { "reference_url": "https://usn.ubuntu.com/3265-2/", "reference_id": "USN-3265-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-5970" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r82-gqnd-9yac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85276?format=api", "vulnerability_id": "VCID-63qx-mgsw-qkf1", "summary": "kernel: ext4 filesystem page fault race condition with fallocate call.", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13091", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12923", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12926", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/04/01/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/04/01/4" }, { "reference_url": "http://www.securityfocus.com/bid/85798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/85798" }, { "reference_url": "http://www.securitytracker.com/id/1035455", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035455" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3006-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3007-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323577", "reference_id": "1323577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839", "reference_id": "CVE-2015-8839", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3005-1/", "reference_id": "USN-3005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3005-1/" }, { "reference_url": "https://usn.ubuntu.com/3006-1/", "reference_id": "USN-3006-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3006-1/" }, { "reference_url": "https://usn.ubuntu.com/3007-1/", "reference_id": "USN-3007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3007-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8839" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63qx-mgsw-qkf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63411?format=api", "vulnerability_id": "VCID-8pqu-nssu-7qav", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08973", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08853", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08977", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09024", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08962", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3945" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/04/16/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/4" }, { "reference_url": "http://www.securityfocus.com/bid/97690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493", "reference_id": "1444493", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889", "reference_id": "CVE-2017-7889", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7889" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pqu-nssu-7qav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84236?format=api", "vulnerability_id": "VCID-9b35-yeeu-3qd8", "summary": "kernel: Incorrectly mapped contents of PIE executable", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71301", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71227", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71211", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71257", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71264", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71241", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000379" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:P/A:N" }, { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165", "reference_id": "1462165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165" }, { "reference_url": "https://security.archlinux.org/AVG-311", "reference_id": "AVG-311", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-311" }, { "reference_url": "https://security.archlinux.org/AVG-320", "reference_id": "AVG-320", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-320" }, { "reference_url": "https://security.archlinux.org/AVG-323", "reference_id": "AVG-323", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-323" }, { "reference_url": "https://security.archlinux.org/AVG-991", "reference_id": "AVG-991", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1482", "reference_id": "RHSA-2017:1482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1484", "reference_id": "RHSA-2017:1484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1485", "reference_id": "RHSA-2017:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1486", "reference_id": "RHSA-2017:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1487", "reference_id": "RHSA-2017:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1488", "reference_id": "RHSA-2017:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1489", "reference_id": "RHSA-2017:1489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1490", "reference_id": "RHSA-2017:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1491", "reference_id": "RHSA-2017:1491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1616", "reference_id": "RHSA-2017:1616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1647", "reference_id": "RHSA-2017:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" } ], "fixed_packages": [], "aliases": [ "CVE-2017-1000379" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9b35-yeeu-3qd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83931?format=api", "vulnerability_id": "VCID-9sde-q1ar-93cy", "summary": "kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98006", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.9802", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.9801", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54194", "scoring_system": "epss", "scoring_elements": "0.98008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.56988", "scoring_system": "epss", "scoring_elements": "0.98146", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.56988", "scoring_system": "epss", "scoring_elements": "0.98143", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-1000253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-1000253" }, { "reference_url": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt" }, { "reference_url": "http://www.securityfocus.com/bid/101010", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "http://www.securityfocus.com/bid/101010" }, { "reference_url": "http://www.securitytracker.com/id/1039434", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "http://www.securitytracker.com/id/1039434" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492212", "reference_id": "1492212", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492212" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1406:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:7.1406:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1406:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1503:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:7.1503:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1503:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1511:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:7.1511:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1511:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1611:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:centos:centos:7.1611:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:centos:centos:7.1611:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42887.c", "reference_id": "CVE-2017-1000253", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42887.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000253", "reference_id": "CVE-2017-1000253", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000253" }, { "reference_url": "https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c", "reference_id": "CVE-2017-1000253", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2793", "reference_id": "RHSA-2017:2793", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2794", "reference_id": "RHSA-2017:2794", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2794" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2795", "reference_id": "RHSA-2017:2795", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2795" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2796", "reference_id": "RHSA-2017:2796", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2796" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2797", "reference_id": "RHSA-2017:2797", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2797" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2798", "reference_id": "RHSA-2017:2798", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2798" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2799", "reference_id": "RHSA-2017:2799", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2800", "reference_id": "RHSA-2017:2800", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2801", "reference_id": "RHSA-2017:2801", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2802", "reference_id": "RHSA-2017:2802", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-09-10T03:55:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2802" } ], "fixed_packages": [], "aliases": [ "CVE-2017-1000253" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sde-q1ar-93cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82188?format=api", "vulnerability_id": "VCID-9tsn-zza5-zudf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15294", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15267", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15201", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15115", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15123", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1518", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15217", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417812", "reference_id": "1417812", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3293-1/", "reference_id": "USN-3293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3293-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2596" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tsn-zza5-zudf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84518?format=api", "vulnerability_id": "VCID-ad4y-dkpp-hyf3", "summary": "kernel: scsi: Stack-based buffer overflow in sg_ioctl function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12176", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12148", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12089", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12184", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12293", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12201", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2017-10-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2017-10-01" }, { "reference_url": "http://www.securityfocus.com/bid/96989", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96989" }, { "reference_url": "http://www.securitytracker.com/id/1038086", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434327", "reference_id": "1434327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434327" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7187", "reference_id": "CVE-2017-7187", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3291-1/", "reference_id": "USN-3291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-1/" }, { "reference_url": "https://usn.ubuntu.com/3291-2/", "reference_id": "USN-3291-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-2/" }, { "reference_url": "https://usn.ubuntu.com/3291-3/", "reference_id": "USN-3291-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-3/" }, { "reference_url": "https://usn.ubuntu.com/3293-1/", "reference_id": "USN-3293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3293-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7187" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ad4y-dkpp-hyf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82845?format=api", "vulnerability_id": "VCID-bpng-b386-n3gu", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9242.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14091", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14078", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14116", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14315", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13998", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1456388", "reference_id": "1456388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1456388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9242" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpng-b386-n3gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81228?format=api", "vulnerability_id": "VCID-ee2v-v111-mbeb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26728", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26671", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26549", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966", "reference_id": "1373966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3126-1/", "reference_id": "USN-3126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-1/" }, { "reference_url": "https://usn.ubuntu.com/3126-2/", "reference_id": "USN-3126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-2/" }, { "reference_url": "https://usn.ubuntu.com/3127-1/", "reference_id": "USN-3127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-1/" }, { "reference_url": "https://usn.ubuntu.com/3127-2/", "reference_id": "USN-3127-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-1/", "reference_id": "USN-3128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-1/" }, { "reference_url": "https://usn.ubuntu.com/3128-2/", "reference_id": "USN-3128-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-3/", "reference_id": "USN-3128-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-3/" }, { "reference_url": "https://usn.ubuntu.com/3129-1/", "reference_id": "USN-3129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-1/" }, { "reference_url": "https://usn.ubuntu.com/3129-2/", "reference_id": "USN-3129-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7042" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee2v-v111-mbeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84786?format=api", "vulnerability_id": "VCID-egg4-ayg5-3yaj", "summary": "kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20397", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20515", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20398", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20625", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2053", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20516", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10741" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1124010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1124010" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "reference_url": "http://www.securityfocus.com/bid/106822", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106822" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671869", "reference_id": "1671869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671869" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741", "reference_id": "CVE-2016-10741", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10741" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-egg4-ayg5-3yaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82191?format=api", "vulnerability_id": "VCID-em45-cam8-tkcn", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19909", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.2015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19907", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126", "reference_id": "1416126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3234-1/", "reference_id": "USN-3234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-1/" }, { "reference_url": "https://usn.ubuntu.com/3234-2/", "reference_id": "USN-3234-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-2/" }, { "reference_url": "https://usn.ubuntu.com/3359-1/", "reference_id": "USN-3359-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3359-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-5551" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-em45-cam8-tkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84653?format=api", "vulnerability_id": "VCID-espt-gh1j-q3ed", "summary": "kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22452", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22641", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210", "reference_id": "1412210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-1/", "reference_id": "USN-3360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10088" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-espt-gh1j-q3ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84469?format=api", "vulnerability_id": "VCID-h53k-m5pj-83ha", "summary": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25072", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24973", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25074", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25083", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62" }, { "reference_url": "https://source.android.com/security/bulletin/2017-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-09-01" }, { "reference_url": "http://www.securityfocus.com/bid/97527", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97527" }, { "reference_url": "http://www.securitytracker.com/id/1038503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038503" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088", "reference_id": "1441088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616", "reference_id": "CVE-2017-7616", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3291-1/", "reference_id": "USN-3291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-1/" }, { "reference_url": "https://usn.ubuntu.com/3291-2/", "reference_id": "USN-3291-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-2/" }, { "reference_url": "https://usn.ubuntu.com/3291-3/", "reference_id": "USN-3291-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-3/" }, { "reference_url": "https://usn.ubuntu.com/3293-1/", "reference_id": "USN-3293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3293-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-1/", "reference_id": "USN-3406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-2/", "reference_id": "USN-3406-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7616" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h53k-m5pj-83ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84538?format=api", "vulnerability_id": "VCID-jsc3-j8v3-x7fy", "summary": "kernel: NULL pointer dereference in keyring_search_aux function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6951", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25867", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25668", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25677", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25775", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6951" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/96943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96943" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01845.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01845.html" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01846.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01846.html" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01849.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01849.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433252", "reference_id": "1433252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433252" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6951", "reference_id": "CVE-2017-6951", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6951" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jsc3-j8v3-x7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82832?format=api", "vulnerability_id": "VCID-kehv-3zaj-mbhd", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60887", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6086", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64813", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.648", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://source.android.com/security/bulletin/2017-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-09-01" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3886", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "reference_url": "http://www.securityfocus.com/bid/98562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/98562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972", "reference_id": "1450972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890", "reference_id": "CVE-2017-8890", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-8890" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kehv-3zaj-mbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84779?format=api", "vulnerability_id": "VCID-khhv-2xey-5faz", "summary": "kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09442", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09454", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09507", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09475", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393904", "reference_id": "1393904", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393904" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3290-1/", "reference_id": "USN-3290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8645" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khhv-2xey-5faz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85401?format=api", "vulnerability_id": "VCID-kukn-1n2h-sbck", "summary": "kernel: crypto: GPF in lrw_crypt caused by null-deref", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11475", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11439", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11524", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11478", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11593", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11401", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386286", "reference_id": "1386286", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2437", "reference_id": "RHSA-2017:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2444", "reference_id": "RHSA-2017:2444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2444" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8970" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kukn-1n2h-sbck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84718?format=api", "vulnerability_id": "VCID-mm41-9j5j-eqc9", "summary": "kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10147.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21632", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2163", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21637", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200", "reference_id": "1404200", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3189-1/", "reference_id": "USN-3189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3189-1/" }, { "reference_url": "https://usn.ubuntu.com/3189-2/", "reference_id": "USN-3189-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3189-2/" }, { "reference_url": "https://usn.ubuntu.com/3190-1/", "reference_id": "USN-3190-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3190-1/" }, { "reference_url": "https://usn.ubuntu.com/3190-2/", "reference_id": "USN-3190-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3190-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10147" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mm41-9j5j-eqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84494?format=api", "vulnerability_id": "VCID-mpgy-hb3y-1kg8", "summary": "kernel: ping socket / AF_LLC connect() sin_family race", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2017/04/04/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/04/04/8" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49988", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.5002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49994", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.4999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49941", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50007", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc" }, { "reference_url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://twitter.com/danieljiang0415/status/845116665184497664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://twitter.com/danieljiang0415/status/845116665184497664" }, { "reference_url": "https://www.exploit-db.com/exploits/42135/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/42135/" }, { "reference_url": "http://www.securityfocus.com/bid/97407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97407" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649", "reference_id": "1436649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671", "reference_id": "CVE-2017-2671", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2671" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpgy-hb3y-1kg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85141?format=api", "vulnerability_id": "VCID-nbej-d99f-3uar", "summary": "kernel: netlink: double-free in netlink_dump", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07709", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07909", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0787", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07903", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07891", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07756", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401502", "reference_id": "1401502", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3168-1/", "reference_id": "USN-3168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-1/" }, { "reference_url": "https://usn.ubuntu.com/3168-2/", "reference_id": "USN-3168-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9806" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nbej-d99f-3uar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82194?format=api", "vulnerability_id": "VCID-qmfy-8xcx-b3e6", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.2992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3015", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30107", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30035", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825", "reference_id": "1422825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825" }, { "reference_url": "https://security.archlinux.org/AVG-187", "reference_id": "AVG-187", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-187" }, { "reference_url": "https://security.archlinux.org/AVG-188", "reference_id": "AVG-188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6001" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmfy-8xcx-b3e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82837?format=api", "vulnerability_id": "VCID-qwqd-dej5-xkd7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452679", "reference_id": "1452679", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0169", "reference_id": "RHSA-2018:0169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0169" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9074" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqd-dej5-xkd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84497?format=api", "vulnerability_id": "VCID-r6q7-bghq-wqfs", "summary": "kernel: Null pointer dereference in search_keyring", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2647.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12509", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1242", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12543", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12512", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81" }, { "reference_url": "http://www.securityfocus.com/bid/97258", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97258" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428353", "reference_id": "1428353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428353" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2647", "reference_id": "CVE-2017-2647", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2437", "reference_id": "RHSA-2017:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2444", "reference_id": "RHSA-2017:2444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3548", "reference_id": "RHSA-2020:3548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3836", "reference_id": "RHSA-2020:3836", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3836" }, { "reference_url": "https://usn.ubuntu.com/3849-1/", "reference_id": "USN-3849-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3849-1/" }, { "reference_url": "https://usn.ubuntu.com/3849-2/", "reference_id": "USN-3849-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3849-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2647" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6q7-bghq-wqfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84755?format=api", "vulnerability_id": "VCID-rmsc-3qyf-nbb9", "summary": "kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10200.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08069", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08212", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08181", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08142", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0821", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08189", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430347", "reference_id": "1430347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2437", "reference_id": "RHSA-2017:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2444", "reference_id": "RHSA-2017:2444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2444" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10200" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmsc-3qyf-nbb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82187?format=api", "vulnerability_id": "VCID-rux1-p2cm-1ucy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2584.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25059", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25042", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24965", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24902", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24891", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413001", "reference_id": "1413001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2584" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rux1-p2cm-1ucy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86102?format=api", "vulnerability_id": "VCID-rxmj-u3wj-tyf4", "summary": "Kernel: fs: VFS denial of service", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7970.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12214", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12247", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12239", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.124", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12266", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" }, { "reference_url": "http://secunia.com/advisories/60174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60174" }, { "reference_url": "http://secunia.com/advisories/61142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61142" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96921" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0826019e529f21c84687521d03f60cd241ca7d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0826019e529f21c84687521d03f60cd241ca7d" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/08/21", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/21" }, { "reference_url": "http://www.securityfocus.com/bid/70319", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70319" }, { "reference_url": "http://www.securitytracker.com/id/1030991", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030991" }, { "reference_url": "http://www.spinics.net/lists/linux-fsdevel/msg79153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/linux-fsdevel/msg79153.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2419-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2419-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2420-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2420-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2513-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2513-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2514-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2514-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151095", "reference_id": "1151095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151095" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7970", "reference_id": "CVE-2014-7970", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/2419-1/", "reference_id": "USN-2419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2419-1/" }, { "reference_url": "https://usn.ubuntu.com/2420-1/", "reference_id": "USN-2420-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2420-1/" }, { "reference_url": "https://usn.ubuntu.com/2447-1/", "reference_id": "USN-2447-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2447-1/" }, { "reference_url": "https://usn.ubuntu.com/2448-1/", "reference_id": "USN-2448-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2448-1/" }, { "reference_url": "https://usn.ubuntu.com/2513-1/", "reference_id": "USN-2513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2513-1/" }, { "reference_url": "https://usn.ubuntu.com/2514-1/", "reference_id": "USN-2514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2514-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-7970" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxmj-u3wj-tyf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84223?format=api", "vulnerability_id": "VCID-sp53-ynj8-h3c1", "summary": "kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96665", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96714", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96712", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.9668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.9671", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466329", "reference_id": "1466329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2437", "reference_id": "RHSA-2017:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2017-8797" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sp53-ynj8-h3c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84723?format=api", "vulnerability_id": "VCID-vtfd-4bee-5bhb", "summary": "kernel: Memory leaks in xfs_attr_list.c error paths", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9685", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.202", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19982", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20093", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19906", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396941", "reference_id": "1396941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3187-1/", "reference_id": "USN-3187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-1/" }, { "reference_url": "https://usn.ubuntu.com/3187-2/", "reference_id": "USN-3187-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9685" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vtfd-4bee-5bhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85009?format=api", "vulnerability_id": "VCID-vw94-6ap1-4ffj", "summary": "kernel: Overflowing kernel mount table using shared bind mount", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11886", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11724", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11841", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11809", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11764", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356471", "reference_id": "1356471", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3160-1/", "reference_id": "USN-3160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3160-1/" }, { "reference_url": "https://usn.ubuntu.com/3160-2/", "reference_id": "USN-3160-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3160-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6213" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw94-6ap1-4ffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84446?format=api", "vulnerability_id": "VCID-w9zu-qksj-uyh1", "summary": "kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user", "references": [ { "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04725", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04995", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04954", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04785", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04826", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04815", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9604" }, { "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=1035576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1035576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f" }, { "reference_url": "http://www.securityfocus.com/bid/102135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102135" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389433", "reference_id": "1389433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389433" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9604", "reference_id": "CVE-2016-9604", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9604" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9zu-qksj-uyh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84739?format=api", "vulnerability_id": "VCID-wkt1-8h3a-m3dr", "summary": "kernel: Use after free in SCSI generic device interface", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19828", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1989", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19762", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19665", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145", "reference_id": "1403145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9576" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkt1-8h3a-m3dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86103?format=api", "vulnerability_id": "VCID-wwme-9jay-qfda", "summary": "Kernel: fs: umount denial of service", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7975.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21918", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22056", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22104", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22058", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" }, { "reference_url": "http://secunia.com/advisories/60174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60174" }, { "reference_url": "http://secunia.com/advisories/61145", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61145" }, { "reference_url": "http://secunia.com/advisories/62633", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62633" }, { "reference_url": "http://secunia.com/advisories/62634", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62634" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96994" }, { "reference_url": "http://thread.gmane.org/gmane.linux.kernel.stable/109312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://thread.gmane.org/gmane.linux.kernel.stable/109312" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/08/22", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/22" }, { "reference_url": "http://www.securityfocus.com/bid/70314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/70314" }, { "reference_url": "http://www.securitytracker.com/id/1031180", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031180" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2415-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2415-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2416-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2416-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2417-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2417-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2418-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2418-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2419-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2419-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2420-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2420-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2421-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2421-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151108", "reference_id": "1151108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151108" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7975", "reference_id": "CVE-2014-7975", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7975" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/2415-1/", "reference_id": "USN-2415-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2415-1/" }, { "reference_url": "https://usn.ubuntu.com/2416-1/", "reference_id": "USN-2416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2416-1/" }, { "reference_url": "https://usn.ubuntu.com/2417-1/", "reference_id": "USN-2417-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2417-1/" }, { "reference_url": "https://usn.ubuntu.com/2418-1/", "reference_id": "USN-2418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2418-1/" }, { "reference_url": "https://usn.ubuntu.com/2419-1/", "reference_id": "USN-2419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2419-1/" }, { "reference_url": "https://usn.ubuntu.com/2420-1/", "reference_id": "USN-2420-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2420-1/" }, { "reference_url": "https://usn.ubuntu.com/2421-1/", "reference_id": "USN-2421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2421-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-7975" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwme-9jay-qfda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82839?format=api", "vulnerability_id": "VCID-xd6f-766q-mkh8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691", "reference_id": "1452691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9075" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6f-766q-mkh8" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-693%3Farch=el7" }