Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/113583?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/113583?format=api", "purl": "pkg:rpm/redhat/kernel-rt@1:3.10.0-514.rt56.210?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "1:3.10.0-514.rt56.210", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84820?format=api", "vulnerability_id": "VCID-dmhc-9nz4-aqdj", "summary": "kernel: Slab out-of-bounds access in sctp_sf_ootb()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9555.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9555.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9555", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.9633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.9638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96377", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96379", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96342", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96362", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96361", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.2694", "scoring_system": "epss", "scoring_elements": "0.96372", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930", "reference_id": "1397930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0086", "reference_id": "RHSA-2017:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0091", "reference_id": "RHSA-2017:0091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0113", "reference_id": "RHSA-2017:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0307", "reference_id": "RHSA-2017:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0307" }, { "reference_url": "https://usn.ubuntu.com/3161-1/", "reference_id": "USN-3161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-1/" }, { "reference_url": "https://usn.ubuntu.com/3161-2/", "reference_id": "USN-3161-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-2/" }, { "reference_url": "https://usn.ubuntu.com/3161-3/", "reference_id": "USN-3161-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-3/" }, { "reference_url": "https://usn.ubuntu.com/3161-4/", "reference_id": "USN-3161-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3161-4/" }, { "reference_url": "https://usn.ubuntu.com/3162-1/", "reference_id": "USN-3162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-1/" }, { "reference_url": "https://usn.ubuntu.com/3162-2/", "reference_id": "USN-3162-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3162-2/" }, { "reference_url": "https://usn.ubuntu.com/3187-1/", "reference_id": "USN-3187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-1/" }, { "reference_url": "https://usn.ubuntu.com/3187-2/", "reference_id": "USN-3187-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3187-2/" }, { "reference_url": "https://usn.ubuntu.com/3188-1/", "reference_id": "USN-3188-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3188-1/" }, { "reference_url": "https://usn.ubuntu.com/3188-2/", "reference_id": "USN-3188-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3188-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-9555" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmhc-9nz4-aqdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85295?format=api", "vulnerability_id": "VCID-f8h3-j8zt-dya3", "summary": "kernel: Use-after-free in the recvmmsg exit path", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7117.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7117.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7117", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93306", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.9325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93263", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93267", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93271", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10558", "scoring_system": "epss", "scoring_elements": "0.93288", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268", "reference_id": "1382268", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2962", "reference_id": "RHSA-2016:2962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0031", "reference_id": "RHSA-2017:0031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0036", "reference_id": "RHSA-2017:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0065", "reference_id": "RHSA-2017:0065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0086", "reference_id": "RHSA-2017:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0091", "reference_id": "RHSA-2017:0091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0113", "reference_id": "RHSA-2017:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0196", "reference_id": "RHSA-2017:0196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0215", "reference_id": "RHSA-2017:0215", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0215" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0216", "reference_id": "RHSA-2017:0216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0217", "reference_id": "RHSA-2017:0217", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0217" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0270", "reference_id": "RHSA-2017:0270", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0270" }, { "reference_url": "https://usn.ubuntu.com/3126-1/", "reference_id": "USN-3126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-1/" }, { "reference_url": "https://usn.ubuntu.com/3126-2/", "reference_id": "USN-3126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3126-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-7117" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8h3-j8zt-dya3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82087?format=api", "vulnerability_id": "VCID-qgnr-pdqy-a3f4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6828.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26759", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26545", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26614", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26623", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26506", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26446", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091", "reference_id": "1367091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40731.c", "reference_id": "CVE-2016-6828", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40731.c" }, { "reference_url": "https://marcograss.github.io/security/linux/2016/08/18/cve-2016-6828-linux-kernel-tcp-uaf.html", "reference_id": "CVE-2016-6828", "reference_type": "exploit", "scores": [], "url": "https://marcograss.github.io/security/linux/2016/08/18/cve-2016-6828-linux-kernel-tcp-uaf.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0036", "reference_id": "RHSA-2017:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0086", "reference_id": "RHSA-2017:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0091", "reference_id": "RHSA-2017:0091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0113", "reference_id": "RHSA-2017:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0113" }, { "reference_url": "https://usn.ubuntu.com/3097-1/", "reference_id": "USN-3097-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3097-1/" }, { "reference_url": "https://usn.ubuntu.com/3097-2/", "reference_id": "USN-3097-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3097-2/" }, { "reference_url": "https://usn.ubuntu.com/3098-1/", "reference_id": "USN-3098-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3098-1/" }, { "reference_url": "https://usn.ubuntu.com/3098-2/", "reference_id": "USN-3098-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3098-2/" }, { "reference_url": "https://usn.ubuntu.com/3099-1/", "reference_id": "USN-3099-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-1/" }, { "reference_url": "https://usn.ubuntu.com/3099-2/", "reference_id": "USN-3099-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-2/" }, { "reference_url": "https://usn.ubuntu.com/3099-3/", "reference_id": "USN-3099-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-3/" }, { "reference_url": "https://usn.ubuntu.com/3099-4/", "reference_id": "USN-3099-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3099-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6828" ], "risk_score": 8.0, "exploitability": "2.0", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qgnr-pdqy-a3f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85337?format=api", "vulnerability_id": "VCID-ujrf-vrxq-p7b7", "summary": "kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read()", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13167.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13167.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13167", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24395", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24453", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2451", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24553", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24569", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24526", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13167" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2017-12-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2017-12-01" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568821", "reference_id": "1568821", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568821" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13167", "reference_id": "CVE-2017-13167", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2574", "reference_id": "RHSA-2016:2574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2584", "reference_id": "RHSA-2016:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0113", "reference_id": "RHSA-2017:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0113" } ], "fixed_packages": [], "aliases": [ "CVE-2017-13167" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujrf-vrxq-p7b7" } ], "fixing_vulnerabilities": [], "risk_score": "8.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@1:3.10.0-514.rt56.210%3Farch=el6rt" }