Lookup for vulnerable packages by Package URL.

GET /api/packages/112706?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/112706?format=api",
    "purl": "pkg:rpm/redhat/kernel@3.10.0-514.21.1?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel",
    "version": "3.10.0-514.21.1",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84481?format=api",
            "vulnerability_id": "VCID-45qw-a51e-8kcp",
            "summary": "kernel: net/packet: overflow in check for priv area size",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9943",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99441",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99437",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9944",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99432",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99434",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99435",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.87",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99436",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7308"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html"
                },
                {
                    "reference_url": "https://patchwork.ozlabs.org/patch/744811/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://patchwork.ozlabs.org/patch/744811/"
                },
                {
                    "reference_url": "https://patchwork.ozlabs.org/patch/744812/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://patchwork.ozlabs.org/patch/744812/"
                },
                {
                    "reference_url": "https://patchwork.ozlabs.org/patch/744813/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://patchwork.ozlabs.org/patch/744813/"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-07-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://source.android.com/security/bulletin/2017-07-01"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/41994/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/41994/"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/44654/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/44654/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97234"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404",
                    "reference_id": "1437404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c"
                },
                {
                    "reference_url": "https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308"
                },
                {
                    "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb",
                    "reference_id": "CVE-2017-7308",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1297",
                    "reference_id": "RHSA-2017:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1298",
                    "reference_id": "RHSA-2017:1298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308",
                    "reference_id": "RHSA-2017:1308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1308"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854",
                    "reference_id": "RHSA-2018:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3256-1/",
                    "reference_id": "USN-3256-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3256-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3256-2/",
                    "reference_id": "USN-3256-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3256-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-7308"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45qw-a51e-8kcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84768?format=api",
            "vulnerability_id": "VCID-4kkf-z6ve-ubh6",
            "summary": "kernel: EXT4 memory corruption / SLAB out-of-bounds read",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16378",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16333",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16332",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16505",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16559",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16541",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16502",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16444",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16404",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16441",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395190",
                    "reference_id": "1395190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395190"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1297",
                    "reference_id": "RHSA-2017:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1298",
                    "reference_id": "RHSA-2017:1298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308",
                    "reference_id": "RHSA-2017:1308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1308"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3234-1/",
                    "reference_id": "USN-3234-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3234-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3234-2/",
                    "reference_id": "USN-3234-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3234-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3361-1/",
                    "reference_id": "USN-3361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3361-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3754-1/",
                    "reference_id": "USN-3754-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3754-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-10208"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kkf-z6ve-ubh6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84951?format=api",
            "vulnerability_id": "VCID-ak28-2yn6-fuh4",
            "summary": "kernel: Use after free in seq file",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7910.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7910.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49169",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49196",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4924",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49237",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49201",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49229",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4918",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49227",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49273",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4927",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7910"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399727",
                    "reference_id": "1399727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399727"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0892",
                    "reference_id": "RHSA-2017:0892",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0892"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1297",
                    "reference_id": "RHSA-2017:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1298",
                    "reference_id": "RHSA-2017:1298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308",
                    "reference_id": "RHSA-2017:1308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1308"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3206-1/",
                    "reference_id": "USN-3206-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3206-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3207-1/",
                    "reference_id": "USN-3207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3207-2/",
                    "reference_id": "USN-3207-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3207-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-7910"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ak28-2yn6-fuh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84766?format=api",
            "vulnerability_id": "VCID-gn59-k2sn-bfhm",
            "summary": "kernel: Oops in shash_async_export()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8646.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8646.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09799",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09889",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09935",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09824",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09899",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09951",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09964",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09926",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09761",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09948",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09911",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09864",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8646"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388821",
                    "reference_id": "1388821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1297",
                    "reference_id": "RHSA-2017:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1298",
                    "reference_id": "RHSA-2017:1298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308",
                    "reference_id": "RHSA-2017:1308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1308"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-8646"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gn59-k2sn-bfhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82706?format=api",
            "vulnerability_id": "VCID-htwt-qkna-e3g9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5986.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5986.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67879",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6803",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67991",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67973",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68016",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68025",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67899",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6795",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67975",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67977",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5986"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420276",
                    "reference_id": "1420276",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420276"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-17",
                    "reference_id": "ASA-201702-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-18",
                    "reference_id": "ASA-201702-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-178",
                    "reference_id": "AVG-178",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-178"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-186",
                    "reference_id": "AVG-186",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-186"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-188",
                    "reference_id": "AVG-188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308",
                    "reference_id": "RHSA-2017:1308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1308"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3264-1/",
                    "reference_id": "USN-3264-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3264-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3264-2/",
                    "reference_id": "USN-3264-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3264-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3265-1/",
                    "reference_id": "USN-3265-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3265-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3265-2/",
                    "reference_id": "USN-3265-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3265-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3266-1/",
                    "reference_id": "USN-3266-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3266-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3266-2/",
                    "reference_id": "USN-3266-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3266-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-5986"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htwt-qkna-e3g9"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-514.21.1%3Farch=el7"
}