Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/373071?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/373071?format=api", "purl": "pkg:alpm/archlinux/linux-zen@4.9.11-2", "type": "alpm", "namespace": "archlinux", "name": "linux-zen", "version": "4.9.11-2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.10.2-1", "latest_non_vulnerable_version": "6.2-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82703?format=api", "vulnerability_id": "VCID-4prt-5e6y-nkfb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22526", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22517", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22827", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22773", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22716", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404924", "reference_id": "1404924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404924" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3822-1/", "reference_id": "USN-3822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-1/" }, { "reference_url": "https://usn.ubuntu.com/3822-2/", "reference_id": "USN-3822-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/373071?format=api", "purl": "pkg:alpm/archlinux/linux-zen@4.9.11-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@4.9.11-2" } ], "aliases": [ "CVE-2016-9588" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4prt-5e6y-nkfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82195?format=api", "vulnerability_id": "VCID-639r-cs68-nyfz", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95476", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071", "reference_id": "1423071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-189", "reference_id": "AVG-189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-189" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0293", "reference_id": "RHSA-2017:0293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0294", "reference_id": "RHSA-2017:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0295", "reference_id": "RHSA-2017:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0316", "reference_id": "RHSA-2017:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0323", "reference_id": "RHSA-2017:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0324", "reference_id": "RHSA-2017:0324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0345", "reference_id": "RHSA-2017:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0346", "reference_id": "RHSA-2017:0346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0347", "reference_id": "RHSA-2017:0347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0365", "reference_id": "RHSA-2017:0365", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0365" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0366", "reference_id": "RHSA-2017:0366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0403", "reference_id": "RHSA-2017:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0501", "reference_id": "RHSA-2017:0501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1209", "reference_id": "RHSA-2017:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1209" }, { "reference_url": "https://usn.ubuntu.com/3206-1/", "reference_id": "USN-3206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3206-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-1/", "reference_id": "USN-3207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-2/", "reference_id": "USN-3207-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-2/" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/373071?format=api", "purl": "pkg:alpm/archlinux/linux-zen@4.9.11-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@4.9.11-2" } ], "aliases": [ "CVE-2017-6074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-639r-cs68-nyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84653?format=api", "vulnerability_id": "VCID-espt-gh1j-q3ed", "summary": "kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22452", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210", "reference_id": "1412210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412210" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-190", "reference_id": "AVG-190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0817", "reference_id": "RHSA-2017:0817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1842", "reference_id": "RHSA-2017:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2077", "reference_id": "RHSA-2017:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2669", "reference_id": "RHSA-2017:2669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2669" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-1/", "reference_id": "USN-3360-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-1/" }, { "reference_url": "https://usn.ubuntu.com/3360-2/", "reference_id": "USN-3360-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3360-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/373071?format=api", "purl": "pkg:alpm/archlinux/linux-zen@4.9.11-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@4.9.11-2" } ], "aliases": [ "CVE-2016-10088" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-espt-gh1j-q3ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82706?format=api", "vulnerability_id": "VCID-htwt-qkna-e3g9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5986.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5986.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5986", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67879", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6803", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68025", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67977", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420276", "reference_id": "1420276", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420276" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-188", "reference_id": "AVG-188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1308", "reference_id": "RHSA-2017:1308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1308" }, { "reference_url": "https://usn.ubuntu.com/3264-1/", "reference_id": "USN-3264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3264-1/" }, { "reference_url": "https://usn.ubuntu.com/3264-2/", "reference_id": "USN-3264-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3264-2/" }, { "reference_url": "https://usn.ubuntu.com/3265-1/", "reference_id": "USN-3265-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-1/" }, { "reference_url": "https://usn.ubuntu.com/3265-2/", "reference_id": "USN-3265-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3265-2/" }, { "reference_url": "https://usn.ubuntu.com/3266-1/", "reference_id": "USN-3266-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3266-1/" }, { "reference_url": "https://usn.ubuntu.com/3266-2/", "reference_id": "USN-3266-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3266-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/373071?format=api", "purl": "pkg:alpm/archlinux/linux-zen@4.9.11-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@4.9.11-2" } ], "aliases": [ "CVE-2017-5986" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htwt-qkna-e3g9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@4.9.11-2" }