Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/111655?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/111655?format=api", "purl": "pkg:rpm/redhat/kernel-rt@1:3.10.0-693.2.1.rt56.585?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "1:3.10.0-693.2.1.rt56.585", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85117?format=api", "vulnerability_id": "VCID-25tv-dd91-wffh", "summary": "kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16595", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16579", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16467", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16424", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938", "reference_id": "1368938", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3146-1/", "reference_id": "USN-3146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-1/" }, { "reference_url": "https://usn.ubuntu.com/3146-2/", "reference_id": "USN-3146-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-2/" }, { "reference_url": "https://usn.ubuntu.com/3147-1/", "reference_id": "USN-3147-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3147-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7097" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25tv-dd91-wffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84362?format=api", "vulnerability_id": "VCID-2nwr-4qy5-j7a5", "summary": "kernel: ext4: power failure during write(2) causes on-disk information leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16077", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16225", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16168", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16101", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16049", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16088", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15978", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15938", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450261", "reference_id": "1450261", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3405-1/", "reference_id": "USN-3405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3405-1/" }, { "reference_url": "https://usn.ubuntu.com/3405-2/", "reference_id": "USN-3405-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3405-2/" }, { "reference_url": "https://usn.ubuntu.com/3406-1/", "reference_id": "USN-3406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-1/" }, { "reference_url": "https://usn.ubuntu.com/3406-2/", "reference_id": "USN-3406-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3406-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7495" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nwr-4qy5-j7a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82840?format=api", "vulnerability_id": "VCID-49zh-3frn-pybg", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688", "reference_id": "1452688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9076" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49zh-3frn-pybg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82842?format=api", "vulnerability_id": "VCID-4brq-uc34-uyb1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.7551", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75542", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75576", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00893", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76529", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76502", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744", "reference_id": "1452744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9077" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4brq-uc34-uyb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63408?format=api", "vulnerability_id": "VCID-5f6p-fkh4-jkf5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7533.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92767", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92812", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92815", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92816", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92779", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92776", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.9279", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09416", "scoring_system": "epss", "scoring_elements": "0.92809", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468283", "reference_id": "1468283", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468283" }, { "reference_url": "https://github.com/hardenedlinux/offensive_poc/blob/4a71e00b07be66606a7cc7c9b1f2213e89188ab7/CVE-2017-7533/exploit.c", "reference_id": "CVE-2017-7533", "reference_type": "exploit", "scores": [], "url": "https://github.com/hardenedlinux/offensive_poc/blob/4a71e00b07be66606a7cc7c9b1f2213e89188ab7/CVE-2017-7533/exploit.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/44302.c", "reference_id": "CVE-2017-7533", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/44302.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2473", "reference_id": "RHSA-2017:2473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2585", "reference_id": "RHSA-2017:2585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2770", "reference_id": "RHSA-2017:2770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2869", "reference_id": "RHSA-2017:2869", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2869" }, { "reference_url": "https://usn.ubuntu.com/3377-1/", "reference_id": "USN-3377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3377-1/" }, { "reference_url": "https://usn.ubuntu.com/3377-2/", "reference_id": "USN-3377-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3377-2/" }, { "reference_url": "https://usn.ubuntu.com/3378-1/", "reference_id": "USN-3378-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3378-1/" }, { "reference_url": "https://usn.ubuntu.com/3378-2/", "reference_id": "USN-3378-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3378-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7533" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5f6p-fkh4-jkf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82193?format=api", "vulnerability_id": "VCID-5r82-gqnd-9yac", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82562", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82602", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82623", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.82634", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01752", "scoring_system": "epss", "scoring_elements": "0.8264", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421638", "reference_id": "1421638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3265-1/", "reference_id": "USN-3265-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-1/" }, { "reference_url": "https://usn.ubuntu.com/3265-2/", "reference_id": "USN-3265-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-5970" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r82-gqnd-9yac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85276?format=api", "vulnerability_id": "VCID-63qx-mgsw-qkf1", "summary": "kernel: ext4 filesystem page fault race condition with fallocate call.", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12907", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13091", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12923", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13023", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/04/01/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/04/01/4" }, { "reference_url": "http://www.securityfocus.com/bid/85798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/85798" }, { "reference_url": "http://www.securitytracker.com/id/1035455", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035455" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3006-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3007-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323577", "reference_id": "1323577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839", "reference_id": "CVE-2015-8839", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3005-1/", "reference_id": "USN-3005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3005-1/" }, { "reference_url": "https://usn.ubuntu.com/3006-1/", "reference_id": "USN-3006-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3006-1/" }, { "reference_url": "https://usn.ubuntu.com/3007-1/", "reference_id": "USN-3007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3007-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8839" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63qx-mgsw-qkf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63411?format=api", "vulnerability_id": "VCID-8pqu-nssu-7qav", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08954", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08977", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09024", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08973", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08853", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3945" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/04/16/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/4" }, { "reference_url": "http://www.securityfocus.com/bid/97690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493", "reference_id": "1444493", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889", "reference_id": "CVE-2017-7889", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7889" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pqu-nssu-7qav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84518?format=api", "vulnerability_id": "VCID-ad4y-dkpp-hyf3", "summary": "kernel: scsi: Stack-based buffer overflow in sg_ioctl function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12176", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12037", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12184", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12148", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12293", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12201", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12089", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2017-10-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2017-10-01" }, { "reference_url": "http://www.securityfocus.com/bid/96989", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96989" }, { "reference_url": "http://www.securitytracker.com/id/1038086", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434327", "reference_id": "1434327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434327" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7187", "reference_id": "CVE-2017-7187", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3291-1/", "reference_id": "USN-3291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-1/" }, { "reference_url": "https://usn.ubuntu.com/3291-2/", "reference_id": "USN-3291-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-2/" }, { "reference_url": "https://usn.ubuntu.com/3291-3/", "reference_id": "USN-3291-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3291-3/" }, { "reference_url": "https://usn.ubuntu.com/3293-1/", "reference_id": "USN-3293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3293-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7187" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ad4y-dkpp-hyf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81228?format=api", "vulnerability_id": "VCID-ee2v-v111-mbeb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26728", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26671", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26476", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966", "reference_id": "1373966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3126-1/", "reference_id": "USN-3126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-1/" }, { "reference_url": "https://usn.ubuntu.com/3126-2/", "reference_id": "USN-3126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-2/" }, { "reference_url": "https://usn.ubuntu.com/3127-1/", "reference_id": "USN-3127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-1/" }, { "reference_url": "https://usn.ubuntu.com/3127-2/", "reference_id": "USN-3127-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-1/", "reference_id": "USN-3128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-1/" }, { "reference_url": "https://usn.ubuntu.com/3128-2/", "reference_id": "USN-3128-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-3/", "reference_id": "USN-3128-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-3/" }, { "reference_url": "https://usn.ubuntu.com/3129-1/", "reference_id": "USN-3129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-1/" }, { "reference_url": "https://usn.ubuntu.com/3129-2/", "reference_id": "USN-3129-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7042" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee2v-v111-mbeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84786?format=api", "vulnerability_id": "VCID-egg4-ayg5-3yaj", "summary": "kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20365", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20398", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20397", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20625", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2053", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20516", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20515", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10741" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1124010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1124010" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "reference_url": "http://www.securityfocus.com/bid/106822", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106822" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671869", "reference_id": "1671869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671869" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741", "reference_id": "CVE-2016-10741", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10741" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-egg4-ayg5-3yaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82191?format=api", "vulnerability_id": "VCID-em45-cam8-tkcn", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.2015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19907", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19909", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126", "reference_id": "1416126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3234-1/", "reference_id": "USN-3234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-1/" }, { "reference_url": "https://usn.ubuntu.com/3234-2/", "reference_id": "USN-3234-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-2/" }, { "reference_url": "https://usn.ubuntu.com/3359-1/", "reference_id": "USN-3359-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3359-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-5551" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-em45-cam8-tkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84653?format=api", "vulnerability_id": "VCID-espt-gh1j-q3ed", "summary": "kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22452", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210", "reference_id": "1412210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-1/", "reference_id": "USN-3360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10088" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-espt-gh1j-q3ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84538?format=api", "vulnerability_id": "VCID-jsc3-j8v3-x7fy", "summary": "kernel: NULL pointer dereference in keyring_search_aux function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6951", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25867", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2562", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25677", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25668", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25778", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6951" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/96943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96943" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01845.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01845.html" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01846.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01846.html" }, { "reference_url": "http://www.spinics.net/lists/keyrings/msg01849.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/keyrings/msg01849.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433252", "reference_id": "1433252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433252" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6951", "reference_id": "CVE-2017-6951", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6951" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jsc3-j8v3-x7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82832?format=api", "vulnerability_id": "VCID-kehv-3zaj-mbhd", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60865", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60887", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6086", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64813", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64834", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.648", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a" }, { "reference_url": "https://source.android.com/security/bulletin/2017-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-09-01" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3886", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "reference_url": "http://www.securityfocus.com/bid/98562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/98562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972", "reference_id": "1450972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890", "reference_id": "CVE-2017-8890", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-8890" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kehv-3zaj-mbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84779?format=api", "vulnerability_id": "VCID-khhv-2xey-5faz", "summary": "kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09442", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09454", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09507", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09475", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09436", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393904", "reference_id": "1393904", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393904" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3290-1/", "reference_id": "USN-3290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8645" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khhv-2xey-5faz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84494?format=api", "vulnerability_id": "VCID-mpgy-hb3y-1kg8", "summary": "kernel: ping socket / AF_LLC connect() sin_family race", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2017/04/04/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/04/04/8" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49988", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.5002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49994", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.4999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49941", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.50007", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00265", "scoring_system": "epss", "scoring_elements": "0.49976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc" }, { "reference_url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893" }, { "reference_url": "https://twitter.com/danieljiang0415/status/845116665184497664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://twitter.com/danieljiang0415/status/845116665184497664" }, { "reference_url": "https://www.exploit-db.com/exploits/42135/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/42135/" }, { "reference_url": "http://www.securityfocus.com/bid/97407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97407" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649", "reference_id": "1436649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c", "reference_id": "CVE-2017-2671", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671", "reference_id": "CVE-2017-2671", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2671" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpgy-hb3y-1kg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85141?format=api", "vulnerability_id": "VCID-nbej-d99f-3uar", "summary": "kernel: netlink: double-free in netlink_dump", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07709", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07814", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0787", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07903", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07891", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07756", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07909", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401502", "reference_id": "1401502", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3168-1/", "reference_id": "USN-3168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-1/" }, { "reference_url": "https://usn.ubuntu.com/3168-2/", "reference_id": "USN-3168-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9806" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nbej-d99f-3uar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82194?format=api", "vulnerability_id": "VCID-qmfy-8xcx-b3e6", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29851", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30107", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30035", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.2992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3015", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825", "reference_id": "1422825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825" }, { "reference_url": "https://security.archlinux.org/AVG-187", "reference_id": "AVG-187", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-187" }, { "reference_url": "https://security.archlinux.org/AVG-188", "reference_id": "AVG-188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6001" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmfy-8xcx-b3e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82837?format=api", "vulnerability_id": "VCID-qwqd-dej5-xkd7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452679", "reference_id": "1452679", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0169", "reference_id": "RHSA-2018:0169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0169" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9074" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqd-dej5-xkd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84223?format=api", "vulnerability_id": "VCID-sp53-ynj8-h3c1", "summary": "kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96665", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96716", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96712", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96714", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.9668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.9671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.30423", "scoring_system": "epss", "scoring_elements": "0.96713", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466329", "reference_id": "1466329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2437", "reference_id": "RHSA-2017:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2017-8797" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sp53-ynj8-h3c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84723?format=api", "vulnerability_id": "VCID-vtfd-4bee-5bhb", "summary": "kernel: Memory leaks in xfs_attr_list.c error paths", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9685", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.202", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19982", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20093", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19875", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396941", "reference_id": "1396941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3187-1/", "reference_id": "USN-3187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-1/" }, { "reference_url": "https://usn.ubuntu.com/3187-2/", "reference_id": "USN-3187-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9685" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vtfd-4bee-5bhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84446?format=api", "vulnerability_id": "VCID-w9zu-qksj-uyh1", "summary": "kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user", "references": [ { "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04725", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04992", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04954", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04995", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04785", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04826", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04763", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9604" }, { "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=1035576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1035576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f" }, { "reference_url": "http://www.securityfocus.com/bid/102135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102135" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389433", "reference_id": "1389433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389433" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9604", "reference_id": "CVE-2016-9604", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3314-1/", "reference_id": "USN-3314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3314-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9604" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9zu-qksj-uyh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84739?format=api", "vulnerability_id": "VCID-wkt1-8h3a-m3dr", "summary": "kernel: Use after free in SCSI generic device interface", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19828", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1989", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19762", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19631", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145", "reference_id": "1403145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9576" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkt1-8h3a-m3dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82839?format=api", "vulnerability_id": "VCID-xd6f-766q-mkh8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691", "reference_id": "1452691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3342-1/", "reference_id": "USN-3342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-1/" }, { "reference_url": "https://usn.ubuntu.com/3342-2/", "reference_id": "USN-3342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3342-2/" }, { "reference_url": "https://usn.ubuntu.com/3343-1/", "reference_id": "USN-3343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-1/" }, { "reference_url": "https://usn.ubuntu.com/3343-2/", "reference_id": "USN-3343-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3343-2/" }, { "reference_url": "https://usn.ubuntu.com/3344-1/", "reference_id": "USN-3344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-1/" }, { "reference_url": "https://usn.ubuntu.com/3344-2/", "reference_id": "USN-3344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3344-2/" }, { "reference_url": "https://usn.ubuntu.com/3345-1/", "reference_id": "USN-3345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-9075" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6f-766q-mkh8" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@1:3.10.0-693.2.1.rt56.585%3Farch=el6rt" }