Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/112892?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/112892?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-696?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-696", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85117?format=api", "vulnerability_id": "VCID-25tv-dd91-wffh", "summary": "kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16595", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16579", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16467", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938", "reference_id": "1368938", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368938" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3146-1/", "reference_id": "USN-3146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-1/" }, { "reference_url": "https://usn.ubuntu.com/3146-2/", "reference_id": "USN-3146-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3146-2/" }, { "reference_url": "https://usn.ubuntu.com/3147-1/", "reference_id": "USN-3147-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3147-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7097" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25tv-dd91-wffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84704?format=api", "vulnerability_id": "VCID-c1g3-p8kf-ayhx", "summary": "kernel: net: Out of bounds stack read in memcpy_fromiovec", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47807", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47859", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.4792", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47913", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47849", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403833", "reference_id": "1403833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0869", "reference_id": "RHSA-2017:0869", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0869" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2930", "reference_id": "RHSA-2017:2930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2931", "reference_id": "RHSA-2017:2931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2931" }, { "reference_url": "https://usn.ubuntu.com/3189-1/", "reference_id": "USN-3189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3189-1/" }, { "reference_url": "https://usn.ubuntu.com/3189-2/", "reference_id": "USN-3189-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3189-2/" }, { "reference_url": "https://usn.ubuntu.com/3190-1/", "reference_id": "USN-3190-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3190-1/" }, { "reference_url": "https://usn.ubuntu.com/3190-2/", "reference_id": "USN-3190-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3190-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8399" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c1g3-p8kf-ayhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81228?format=api", "vulnerability_id": "VCID-ee2v-v111-mbeb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26728", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26671", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26549", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966", "reference_id": "1373966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3126-1/", "reference_id": "USN-3126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-1/" }, { "reference_url": "https://usn.ubuntu.com/3126-2/", "reference_id": "USN-3126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-2/" }, { "reference_url": "https://usn.ubuntu.com/3127-1/", "reference_id": "USN-3127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-1/" }, { "reference_url": "https://usn.ubuntu.com/3127-2/", "reference_id": "USN-3127-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3127-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-1/", "reference_id": "USN-3128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-1/" }, { "reference_url": "https://usn.ubuntu.com/3128-2/", "reference_id": "USN-3128-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-2/" }, { "reference_url": "https://usn.ubuntu.com/3128-3/", "reference_id": "USN-3128-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3128-3/" }, { "reference_url": "https://usn.ubuntu.com/3129-1/", "reference_id": "USN-3129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-1/" }, { "reference_url": "https://usn.ubuntu.com/3129-2/", "reference_id": "USN-3129-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3129-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7042" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee2v-v111-mbeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82191?format=api", "vulnerability_id": "VCID-em45-cam8-tkcn", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19909", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.2015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19907", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126", "reference_id": "1416126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3234-1/", "reference_id": "USN-3234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-1/" }, { "reference_url": "https://usn.ubuntu.com/3234-2/", "reference_id": "USN-3234-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3234-2/" }, { "reference_url": "https://usn.ubuntu.com/3359-1/", "reference_id": "USN-3359-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3359-1/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-5551" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-em45-cam8-tkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84653?format=api", "vulnerability_id": "VCID-espt-gh1j-q3ed", "summary": "kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22452", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22641", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210", "reference_id": "1412210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-1/", "reference_id": "USN-3360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10088" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-espt-gh1j-q3ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55589?format=api", "vulnerability_id": "VCID-gqcy-xcwt-3bf8", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92574", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92598", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92603", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08978", "scoring_system": "epss", "scoring_elements": "0.92609", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7" }, { "reference_url": "https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3503" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/14/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/02/14/2" }, { "reference_url": "http://www.securityfocus.com/bid/83256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83256" }, { "reference_url": "http://www.securitytracker.com/id/1035072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035072" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2928-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2928-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2928-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2928-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2929-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2929-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2929-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2929-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2930-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2930-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2930-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2930-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2930-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2930-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2931-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2931-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2932-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2932-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308444", "reference_id": "1308444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308444" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41999.txt", "reference_id": "CVE-2016-2384", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41999.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384", "reference_id": "CVE-2016-2384", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384" }, { "reference_url": "https://xairy.github.io/blog/2016/cve-2016-2384", "reference_id": "CVE-2016-2384", "reference_type": "exploit", "scores": [], "url": "https://xairy.github.io/blog/2016/cve-2016-2384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2574", "reference_id": "RHSA-2016:2574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2584", "reference_id": "RHSA-2016:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://usn.ubuntu.com/2928-1/", "reference_id": "USN-2928-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2928-1/" }, { "reference_url": "https://usn.ubuntu.com/2928-2/", "reference_id": "USN-2928-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2928-2/" }, { "reference_url": "https://usn.ubuntu.com/2929-1/", "reference_id": "USN-2929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2929-1/" }, { "reference_url": "https://usn.ubuntu.com/2929-2/", "reference_id": "USN-2929-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2929-2/" }, { "reference_url": "https://usn.ubuntu.com/2930-1/", "reference_id": "USN-2930-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2930-1/" }, { "reference_url": "https://usn.ubuntu.com/2930-2/", "reference_id": "USN-2930-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2930-2/" }, { "reference_url": "https://usn.ubuntu.com/2930-3/", "reference_id": "USN-2930-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2930-3/" }, { "reference_url": "https://usn.ubuntu.com/2931-1/", "reference_id": "USN-2931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2931-1/" }, { "reference_url": "https://usn.ubuntu.com/2932-1/", "reference_id": "USN-2932-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2932-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2384" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcy-xcwt-3bf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55587?format=api", "vulnerability_id": "VCID-gr4q-d11j-9yhm", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71b3c126e61177eb693423f2e18a1914205b165e", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71b3c126e61177eb693423f2e18a1914205b165e" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0817.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2069.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2069.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2069", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19204", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19001", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19112", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1939", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19107", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19239", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19245", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19198", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19102", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2069" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/71b3c126e61177eb693423f2e18a1914205b165e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/71b3c126e61177eb693423f2e18a1914205b165e" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3503" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/25/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/1" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "reference_url": "http://www.securityfocus.com/bid/81809", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81809" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2931-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2931-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2932-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2932-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2967-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2967-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2967-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2967-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2989-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2989-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2998-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301893", "reference_id": "1301893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301893" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2069", "reference_id": "CVE-2016-2069", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2574", "reference_id": "RHSA-2016:2574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2584", "reference_id": "RHSA-2016:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://usn.ubuntu.com/2908-1/", "reference_id": "USN-2908-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2908-1/" }, { "reference_url": "https://usn.ubuntu.com/2908-2/", "reference_id": "USN-2908-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2908-2/" }, { "reference_url": "https://usn.ubuntu.com/2908-3/", "reference_id": "USN-2908-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2908-3/" }, { "reference_url": "https://usn.ubuntu.com/2931-1/", "reference_id": "USN-2931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2931-1/" }, { "reference_url": "https://usn.ubuntu.com/2932-1/", "reference_id": "USN-2932-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2932-1/" }, { "reference_url": "https://usn.ubuntu.com/2967-1/", "reference_id": "USN-2967-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2967-1/" }, { "reference_url": "https://usn.ubuntu.com/2967-2/", "reference_id": "USN-2967-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2967-2/" }, { "reference_url": "https://usn.ubuntu.com/2989-1/", "reference_id": "USN-2989-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2989-1/" }, { "reference_url": "https://usn.ubuntu.com/2998-1/", "reference_id": "USN-2998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2998-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2069" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gr4q-d11j-9yhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84626?format=api", "vulnerability_id": "VCID-jmer-u867-8yhc", "summary": "kernel - IPV6 fragmentation flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10142.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.77995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78041", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78046", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78055", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78087", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78086", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78079", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78119", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415908", "reference_id": "1415908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" } ], "fixed_packages": [], "aliases": [ "CVE-2016-10142" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jmer-u867-8yhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82086?format=api", "vulnerability_id": "VCID-kczj-7nny-hqet", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6480.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19335", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19233", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19325", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19353", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19315", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19322", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362466", "reference_id": "1362466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362466" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2574", "reference_id": "RHSA-2016:2574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2584", "reference_id": "RHSA-2016:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://usn.ubuntu.com/3097-1/", "reference_id": "USN-3097-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3097-1/" }, { "reference_url": "https://usn.ubuntu.com/3097-2/", "reference_id": "USN-3097-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3097-2/" }, { "reference_url": "https://usn.ubuntu.com/3098-1/", "reference_id": "USN-3098-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3098-1/" }, { "reference_url": "https://usn.ubuntu.com/3098-2/", "reference_id": "USN-3098-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3098-2/" }, { "reference_url": "https://usn.ubuntu.com/3099-1/", "reference_id": "USN-3099-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-1/" }, { "reference_url": "https://usn.ubuntu.com/3099-2/", "reference_id": "USN-3099-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-2/" }, { "reference_url": "https://usn.ubuntu.com/3099-3/", "reference_id": "USN-3099-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-3/" }, { "reference_url": "https://usn.ubuntu.com/3099-4/", "reference_id": "USN-3099-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6480" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kczj-7nny-hqet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84739?format=api", "vulnerability_id": "VCID-wkt1-8h3a-m3dr", "summary": "kernel: Use after free in SCSI generic device interface", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19828", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1989", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19762", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19665", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145", "reference_id": "1403145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9576" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkt1-8h3a-m3dr" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-696%3Farch=el6" }