Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/112776?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/112776?format=api", "purl": "pkg:rpm/redhat/kernel-rt@1:3.10.0-514.rt56.219?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "1:3.10.0-514.rt56.219", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82195?format=api", "vulnerability_id": "VCID-639r-cs68-nyfz", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95476", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071", "reference_id": "1423071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-189", "reference_id": "AVG-189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-189" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0293", "reference_id": "RHSA-2017:0293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0294", "reference_id": "RHSA-2017:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0295", "reference_id": "RHSA-2017:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0316", "reference_id": "RHSA-2017:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0323", "reference_id": "RHSA-2017:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0324", "reference_id": "RHSA-2017:0324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0345", "reference_id": "RHSA-2017:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0346", "reference_id": "RHSA-2017:0346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0347", "reference_id": "RHSA-2017:0347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0365", "reference_id": "RHSA-2017:0365", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0365" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0366", "reference_id": "RHSA-2017:0366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0403", "reference_id": "RHSA-2017:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0501", "reference_id": "RHSA-2017:0501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1209", "reference_id": "RHSA-2017:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1209" }, { "reference_url": "https://usn.ubuntu.com/3206-1/", "reference_id": "USN-3206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3206-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-1/", "reference_id": "USN-3207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-2/", "reference_id": "USN-3207-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-2/" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-639r-cs68-nyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82704?format=api", "vulnerability_id": "VCID-914a-bmxp-jubt", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2636.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66652", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66798", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66779", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66763", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66787", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66801", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.6669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66739", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66754", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66764", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428319", "reference_id": "1428319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428319" }, { "reference_url": "https://security.archlinux.org/ASA-201703-13", "reference_id": "ASA-201703-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201703-13" }, { "reference_url": "https://security.archlinux.org/ASA-201703-6", "reference_id": "ASA-201703-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201703-6" }, { "reference_url": "https://security.archlinux.org/ASA-201703-8", "reference_id": "ASA-201703-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201703-8" }, { "reference_url": "https://security.archlinux.org/AVG-192", "reference_id": "AVG-192", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-192" }, { "reference_url": "https://security.archlinux.org/AVG-200", "reference_id": "AVG-200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-200" }, { "reference_url": "https://security.archlinux.org/AVG-203", "reference_id": "AVG-203", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0892", "reference_id": "RHSA-2017:0892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0931", "reference_id": "RHSA-2017:0931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0933", "reference_id": "RHSA-2017:0933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0986", "reference_id": "RHSA-2017:0986", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0986" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1125", "reference_id": "RHSA-2017:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1126", "reference_id": "RHSA-2017:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1232", "reference_id": "RHSA-2017:1232", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1232" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1233", "reference_id": "RHSA-2017:1233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1488", "reference_id": "RHSA-2017:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1488" }, { "reference_url": "https://usn.ubuntu.com/3218-1/", "reference_id": "USN-3218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3218-1/" }, { "reference_url": "https://usn.ubuntu.com/3219-1/", "reference_id": "USN-3219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3219-1/" }, { "reference_url": "https://usn.ubuntu.com/3219-2/", "reference_id": "USN-3219-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3219-2/" }, { "reference_url": "https://usn.ubuntu.com/3220-1/", "reference_id": "USN-3220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3220-1/" }, { "reference_url": "https://usn.ubuntu.com/3220-2/", "reference_id": "USN-3220-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3220-2/" }, { "reference_url": "https://usn.ubuntu.com/3220-3/", "reference_id": "USN-3220-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3220-3/" }, { "reference_url": "https://usn.ubuntu.com/3221-1/", "reference_id": "USN-3221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3221-1/" }, { "reference_url": "https://usn.ubuntu.com/3221-2/", "reference_id": "USN-3221-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3221-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2636" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-914a-bmxp-jubt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84767?format=api", "vulnerability_id": "VCID-pmgn-pun5-xbch", "summary": "kernel: Null pointer dereference via keyctl", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13583", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13708", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13677", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1372", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.137", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187", "reference_id": "1395187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0931", "reference_id": "RHSA-2017:0931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0933", "reference_id": "RHSA-2017:0933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854", "reference_id": "RHSA-2018:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8650" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmgn-pun5-xbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82189?format=api", "vulnerability_id": "VCID-wbqg-pxqh-2qaw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15515", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15617", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1556", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419916", "reference_id": "1419916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0931", "reference_id": "RHSA-2017:0931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0933", "reference_id": "RHSA-2017:0933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0933" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3381-1/", "reference_id": "USN-3381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3381-1/" }, { "reference_url": "https://usn.ubuntu.com/3381-2/", "reference_id": "USN-3381-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3381-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2618" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbqg-pxqh-2qaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84717?format=api", "vulnerability_id": "VCID-yx7y-96j2-xuau", "summary": "kernel: Signed overflow for SO_{SND|RCV}BUFFORCE", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9793.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9793.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9793", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.85961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.85973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.85989", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.85988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86046", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86058", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02763", "scoring_system": "epss", "scoring_elements": "0.86067", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:M/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402013", "reference_id": "1402013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402013" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/1b230097e769d7d13dce1e24b51d4aba1e2a0cc7/CVE-2016-9793/poc.c", "reference_id": "CVE-2016-9793", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/1b230097e769d7d13dce1e24b51d4aba1e2a0cc7/CVE-2016-9793/poc.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41995.c", "reference_id": "CVE-2016-9793", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41995.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0931", "reference_id": "RHSA-2017:0931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0933", "reference_id": "RHSA-2017:0933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0933" }, { "reference_url": "https://usn.ubuntu.com/3168-1/", "reference_id": "USN-3168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-1/" }, { "reference_url": "https://usn.ubuntu.com/3168-2/", "reference_id": "USN-3168-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3168-2/" }, { "reference_url": "https://usn.ubuntu.com/3169-1/", "reference_id": "USN-3169-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3169-1/" }, { "reference_url": "https://usn.ubuntu.com/3169-2/", "reference_id": "USN-3169-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3169-2/" }, { "reference_url": "https://usn.ubuntu.com/3169-3/", "reference_id": "USN-3169-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3169-3/" }, { "reference_url": "https://usn.ubuntu.com/3169-4/", "reference_id": "USN-3169-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3169-4/" }, { "reference_url": "https://usn.ubuntu.com/3170-1/", "reference_id": "USN-3170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3170-1/" }, { "reference_url": "https://usn.ubuntu.com/3170-2/", "reference_id": "USN-3170-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3170-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9793" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx7y-96j2-xuau" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@1:3.10.0-514.rt56.219%3Farch=el6rt" }