Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/113509?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/113509?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.10.2.rt56.435?arch=el7", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "3.10.0-514.10.2.rt56.435", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84701?format=api", "vulnerability_id": "VCID-3m2e-pzkb-3kct", "summary": "kernel: Race condition in packet_set_ring leads to use after free", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.34922", "scoring_system": "epss", "scoring_elements": "0.97044", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.34922", "scoring_system": "epss", "scoring_elements": "0.97035", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.34922", "scoring_system": "epss", "scoring_elements": "0.97039", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.34922", "scoring_system": "epss", "scoring_elements": "0.97041", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.34922", "scoring_system": "epss", "scoring_elements": "0.97043", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97228", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.97237", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38274", "scoring_system": "epss", "scoring_elements": "0.972", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400019", "reference_id": "1400019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400019" }, { "reference_url": "https://security.archlinux.org/ASA-201612-6", "reference_id": "ASA-201612-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-6" }, { "reference_url": "https://security.archlinux.org/ASA-201612-7", "reference_id": "ASA-201612-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-7" }, { "reference_url": "https://security.archlinux.org/ASA-201612-8", "reference_id": "ASA-201612-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-8" }, { "reference_url": "https://security.archlinux.org/AVG-95", "reference_id": "AVG-95", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-95" }, { "reference_url": "https://security.archlinux.org/AVG-96", "reference_id": "AVG-96", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-96" }, { "reference_url": "https://security.archlinux.org/AVG-98", "reference_id": "AVG-98", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-98" }, { "reference_url": "http://seclists.org/oss-sec/2016/q4/607", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "http://seclists.org/oss-sec/2016/q4/607" }, { "reference_url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb", "reference_id": "CVE-2016-8655", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0386", "reference_id": "RHSA-2017:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0387", "reference_id": "RHSA-2017:0387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0402", "reference_id": "RHSA-2017:0402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0402" }, { "reference_url": "https://usn.ubuntu.com/3149-1/", "reference_id": "USN-3149-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3149-1/" }, { "reference_url": "https://usn.ubuntu.com/3149-2/", "reference_id": "USN-3149-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3149-2/" }, { "reference_url": "https://usn.ubuntu.com/3150-1/", "reference_id": "USN-3150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3150-1/" }, { "reference_url": "https://usn.ubuntu.com/3150-2/", "reference_id": "USN-3150-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3150-2/" }, { "reference_url": "https://usn.ubuntu.com/3151-1/", "reference_id": "USN-3151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3151-1/" }, { "reference_url": "https://usn.ubuntu.com/3151-2/", "reference_id": "USN-3151-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3151-2/" }, { "reference_url": "https://usn.ubuntu.com/3151-3/", "reference_id": "USN-3151-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3151-3/" }, { "reference_url": "https://usn.ubuntu.com/3151-4/", "reference_id": "USN-3151-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3151-4/" }, { "reference_url": "https://usn.ubuntu.com/3152-1/", "reference_id": "USN-3152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3152-1/" }, { "reference_url": "https://usn.ubuntu.com/3152-2/", "reference_id": "USN-3152-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3152-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8655" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m2e-pzkb-3kct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84852?format=api", "vulnerability_id": "VCID-4fxd-fxb3-9fgf", "summary": "kernel: State machine confusion bug in vfio driver leading to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14698", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14748", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14823", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14645", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14537", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14543", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14607", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14635", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14574", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389258", "reference_id": "1389258", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389258" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0386", "reference_id": "RHSA-2017:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0387", "reference_id": "RHSA-2017:0387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0387" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9083" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fxd-fxb3-9fgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84801?format=api", "vulnerability_id": "VCID-b9n6-363a-pqgj", "summary": "kernel: kvm: x86: NULL pointer dereference during instruction decode", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08737", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0878", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08748", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08775", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08753", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08615", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08768", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350", "reference_id": "1393350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0386", "reference_id": "RHSA-2017:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0387", "reference_id": "RHSA-2017:0387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0387" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8630" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b9n6-363a-pqgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84853?format=api", "vulnerability_id": "VCID-qgte-zhf5-jbak", "summary": "kernel: Integer overflow when using kzalloc in vfio driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15843", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15709", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15794", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15833", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15648", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1572", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15716", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15659", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389259", "reference_id": "1389259", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0386", "reference_id": "RHSA-2017:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0387", "reference_id": "RHSA-2017:0387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0387" }, { "reference_url": "https://usn.ubuntu.com/3312-1/", "reference_id": "USN-3312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-1/" }, { "reference_url": "https://usn.ubuntu.com/3312-2/", "reference_id": "USN-3312-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3312-2/" }, { "reference_url": "https://usn.ubuntu.com/3361-1/", "reference_id": "USN-3361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3361-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-1/", "reference_id": "USN-3422-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-1/" }, { "reference_url": "https://usn.ubuntu.com/3422-2/", "reference_id": "USN-3422-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3422-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9084" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qgte-zhf5-jbak" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-514.10.2.rt56.435%3Farch=el7" }