Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
Typedeb
Namespacedebian
Namelxc
Version1:5.0.2-1+deb12u3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:6.0.4-4+deb13u2
Latest_non_vulnerable_version1:6.0.6-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1rds-zc87-auf6
vulnerability_id VCID-1rds-zc87-auf6
summary
A vulnerability has been found in LXC which may allow for arbitrary
    file access (read-only).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6556
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18319
published_at 2026-04-24T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18417
published_at 2026-04-21T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18487
published_at 2026-04-01T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18632
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18687
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18402
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18483
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18536
published_at 2026-04-09T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18538
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.1849
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18439
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18383
published_at 2026-04-16T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6556
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6556
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905586
reference_id 905586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905586
4
reference_url https://security.archlinux.org/AVG-754
reference_id AVG-754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-754
5
reference_url https://security.gentoo.org/glsa/201808-02
reference_id GLSA-201808-02
reference_type
scores
url https://security.gentoo.org/glsa/201808-02
6
reference_url https://usn.ubuntu.com/3730-1/
reference_id USN-3730-1
reference_type
scores
url https://usn.ubuntu.com/3730-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:2.0.9-6.1?distro=trixie
purl pkg:deb/debian/lxc@1:2.0.9-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.9-6.1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2018-6556
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rds-zc87-auf6
1
url VCID-2esq-3t19-akam
vulnerability_id VCID-2esq-3t19-akam
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1331
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14978
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.15019
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15097
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14901
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14989
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.15041
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.15006
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14968
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.1491
published_at 2026-04-24T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14809
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14816
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14872
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298
reference_id 793298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298
4
reference_url https://usn.ubuntu.com/2675-1/
reference_id USN-2675-1
reference_type
scores
url https://usn.ubuntu.com/2675-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie
purl pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.7-4%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2015-1331
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2esq-3t19-akam
2
url VCID-7juj-78y7-g7b6
vulnerability_id VCID-7juj-78y7-g7b6
summary
Containment Errors (Container Errors)
runc allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to `/proc/self/exe`.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
10
reference_url http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html
11
reference_url http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json
13
reference_url https://access.redhat.com/security/cve/cve-2019-5736
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2019-5736
14
reference_url https://access.redhat.com/security/vulnerabilities/runcescape
reference_id
reference_type
scores
url https://access.redhat.com/security/vulnerabilities/runcescape
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5736
reference_id
reference_type
scores
0
value 0.55296
scoring_system epss
scoring_elements 0.98055
published_at 2026-04-02T12:55:00Z
1
value 0.55296
scoring_system epss
scoring_elements 0.98049
published_at 2026-04-01T12:55:00Z
2
value 0.55296
scoring_system epss
scoring_elements 0.98076
published_at 2026-04-18T12:55:00Z
3
value 0.55296
scoring_system epss
scoring_elements 0.98057
published_at 2026-04-04T12:55:00Z
4
value 0.59178
scoring_system epss
scoring_elements 0.98241
published_at 2026-04-24T12:55:00Z
5
value 0.59178
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-07T12:55:00Z
6
value 0.59178
scoring_system epss
scoring_elements 0.98231
published_at 2026-04-09T12:55:00Z
7
value 0.59178
scoring_system epss
scoring_elements 0.98234
published_at 2026-04-13T12:55:00Z
8
value 0.59178
scoring_system epss
scoring_elements 0.98239
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5736
16
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
reference_id
reference_type
scores
url https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
17
reference_url https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
reference_id
reference_type
scores
url https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
18
reference_url https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
reference_id
reference_type
scores
url https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
19
reference_url https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
reference_id
reference_type
scores
url https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
20
reference_url https://brauner.github.io/2019/02/12/privileged-containers.html
reference_id
reference_type
scores
url https://brauner.github.io/2019/02/12/privileged-containers.html
21
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1121967
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1121967
22
reference_url https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
reference_id
reference_type
scores
url https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://github.com/docker/docker-ce/releases/tag/v18.09.2
reference_id
reference_type
scores
url https://github.com/docker/docker-ce/releases/tag/v18.09.2
26
reference_url https://github.com/Frichetten/CVE-2019-5736-PoC
reference_id
reference_type
scores
url https://github.com/Frichetten/CVE-2019-5736-PoC
27
reference_url https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
reference_id
reference_type
scores
url https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
28
reference_url https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
reference_id
reference_type
scores
url https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
29
reference_url https://github.com/q3k/cve-2019-5736-poc
reference_id
reference_type
scores
url https://github.com/q3k/cve-2019-5736-poc
30
reference_url https://github.com/rancher/runc-cve
reference_id
reference_type
scores
url https://github.com/rancher/runc-cve
31
reference_url https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
reference_id
reference_type
scores
url https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
32
reference_url https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
42
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
43
reference_url https://security.netapp.com/advisory/ntap-20190307-0008/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190307-0008/
44
reference_url https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944
reference_id
reference_type
scores
url https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944
45
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us
46
reference_url https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
reference_id
reference_type
scores
url https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
47
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
reference_id
reference_type
scores
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
48
reference_url https://www.exploit-db.com/exploits/46359/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46359/
49
reference_url https://www.exploit-db.com/exploits/46369/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46369/
50
reference_url https://www.openwall.com/lists/oss-security/2019/02/11/2
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/02/11/2
51
reference_url https://www.synology.com/security/advisory/Synology_SA_19_06
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_06
52
reference_url https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
reference_id
reference_type
scores
url https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
53
reference_url http://www.openwall.com/lists/oss-security/2019/03/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/03/23/1
54
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/2
55
reference_url http://www.openwall.com/lists/oss-security/2019/07/06/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/07/06/3
56
reference_url http://www.openwall.com/lists/oss-security/2019/07/06/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/07/06/4
57
reference_url http://www.openwall.com/lists/oss-security/2019/10/24/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/24/1
58
reference_url http://www.openwall.com/lists/oss-security/2019/10/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/29/3
59
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/01/31/6
60
reference_url http://www.openwall.com/lists/oss-security/2024/02/01/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/02/01/1
61
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/02/02/3
62
reference_url http://www.securityfocus.com/bid/106976
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106976
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664908
reference_id 1664908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664908
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050
reference_id 922050
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050
65
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169
reference_id 922169
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169
66
reference_url https://security.archlinux.org/ASA-201902-20
reference_id ASA-201902-20
reference_type
scores
url https://security.archlinux.org/ASA-201902-20
67
reference_url https://security.archlinux.org/ASA-201902-6
reference_id ASA-201902-6
reference_type
scores
url https://security.archlinux.org/ASA-201902-6
68
reference_url https://security.archlinux.org/AVG-878
reference_id AVG-878
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-878
69
reference_url https://security.archlinux.org/AVG-880
reference_id AVG-880
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-880
70
reference_url https://security.archlinux.org/AVG-892
reference_id AVG-892
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-892
71
reference_url https://security.archlinux.org/AVG-893
reference_id AVG-893
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-893
72
reference_url https://security.archlinux.org/AVG-895
reference_id AVG-895
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-895
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
111
reference_url https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736
reference_id CVE-2019-5736
reference_type exploit
scores
url https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736
112
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md
reference_id CVE-2019-5736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md
113
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md
reference_id CVE-2019-5736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md
114
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5736
reference_id CVE-2019-5736
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-5736
115
reference_url https://www.openwall.com/lists/oss-security/2019/02/13/3
reference_id CVE-2019-5736
reference_type exploit
scores
url https://www.openwall.com/lists/oss-security/2019/02/13/3
116
reference_url https://security.gentoo.org/glsa/202003-21
reference_id GLSA-202003-21
reference_type
scores
url https://security.gentoo.org/glsa/202003-21
117
reference_url https://access.redhat.com/errata/RHSA-2019:0303
reference_id RHSA-2019:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0303
118
reference_url https://access.redhat.com/errata/RHSA-2019:0304
reference_id RHSA-2019:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0304
119
reference_url https://access.redhat.com/errata/RHSA-2019:0401
reference_id RHSA-2019:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0401
120
reference_url https://access.redhat.com/errata/RHSA-2019:0408
reference_id RHSA-2019:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0408
121
reference_url https://access.redhat.com/errata/RHSA-2019:0975
reference_id RHSA-2019:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0975
122
reference_url https://usn.ubuntu.com/4048-1/
reference_id USN-4048-1
reference_type
scores
url https://usn.ubuntu.com/4048-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:3.1.0%2Breally3.0.3-4?distro=trixie
purl pkg:deb/debian/lxc@1:3.1.0%2Breally3.0.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:3.1.0%252Breally3.0.3-4%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2019-5736
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7juj-78y7-g7b6
3
url VCID-7qzu-162d-7ug4
vulnerability_id VCID-7qzu-162d-7ug4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1334
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27956
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.28029
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.28072
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27866
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27933
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27974
published_at 2026-04-11T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27932
published_at 2026-04-12T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27873
published_at 2026-04-13T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27882
published_at 2026-04-16T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27863
published_at 2026-04-18T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-21T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27736
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1334
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298
reference_id 793298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793298
4
reference_url https://usn.ubuntu.com/2675-1/
reference_id USN-2675-1
reference_type
scores
url https://usn.ubuntu.com/2675-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie
purl pkg:deb/debian/lxc@1:1.0.7-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.7-4%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2015-1334
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qzu-162d-7ug4
4
url VCID-brf5-pqx1-13bu
vulnerability_id VCID-brf5-pqx1-13bu
summary A vulnerability in LXC may lead to an unauthorized security bypass.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10124
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51154
published_at 2026-04-24T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.5109
published_at 2026-04-01T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51143
published_at 2026-04-02T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51167
published_at 2026-04-04T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51124
published_at 2026-04-07T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51179
published_at 2026-04-08T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51175
published_at 2026-04-09T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51219
published_at 2026-04-11T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51197
published_at 2026-04-12T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51183
published_at 2026-04-13T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51222
published_at 2026-04-16T12:55:00Z
11
value 0.00277
scoring_system epss
scoring_elements 0.51229
published_at 2026-04-18T12:55:00Z
12
value 0.00277
scoring_system epss
scoring_elements 0.51208
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10124
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/201711-09
reference_id GLSA-201711-09
reference_type
scores
url https://security.gentoo.org/glsa/201711-09
4
reference_url https://usn.ubuntu.com/3375-1/
reference_id USN-3375-1
reference_type
scores
url https://usn.ubuntu.com/3375-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:2.0.0-1?distro=trixie
purl pkg:deb/debian/lxc@1:2.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.0-1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2016-10124
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brf5-pqx1-13bu
5
url VCID-hdgf-23he-vkb6
vulnerability_id VCID-hdgf-23he-vkb6
summary lxc: sshd template allow privilege escalation on host
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6441
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10327
published_at 2026-04-24T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10177
published_at 2026-04-01T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10297
published_at 2026-04-02T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10364
published_at 2026-04-04T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10265
published_at 2026-04-07T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10338
published_at 2026-04-08T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10404
published_at 2026-04-09T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10432
published_at 2026-04-11T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10393
published_at 2026-04-12T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10371
published_at 2026-04-13T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10242
published_at 2026-04-16T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10213
published_at 2026-04-18T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10346
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1045988
reference_id 1045988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1045988
5
reference_url https://usn.ubuntu.com/2104-1/
reference_id USN-2104-1
reference_type
scores
url https://usn.ubuntu.com/2104-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1.0.0-1?distro=trixie
purl pkg:deb/debian/lxc@1.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1.0.0-1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2013-6441
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdgf-23he-vkb6
6
url VCID-mac4-jq4n-c3hm
vulnerability_id VCID-mac4-jq4n-c3hm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1335
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-01T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.297
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.2975
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.2957
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29632
published_at 2026-04-08T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.2967
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29672
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29628
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29577
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29596
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29525
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29409
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1335
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800471
reference_id 800471
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800471
3
reference_url https://usn.ubuntu.com/2753-1/
reference_id USN-2753-1
reference_type
scores
url https://usn.ubuntu.com/2753-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:1.0.8-1?distro=trixie
purl pkg:deb/debian/lxc@1:1.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:1.0.8-1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2015-1335
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mac4-jq4n-c3hm
7
url VCID-xq22-fmtf-8yhs
vulnerability_id VCID-xq22-fmtf-8yhs
summary lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because "Failed to open" often indicates that a file does not exist, whereas "does not refer to a network namespace path" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that "we will report back to the user that the open() failed but the user has no way of knowing why it failed"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47952
reference_id
reference_type
scores
0
value 0.01699
scoring_system epss
scoring_elements 0.82243
published_at 2026-04-07T12:55:00Z
1
value 0.01699
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-02T12:55:00Z
2
value 0.01699
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-09T12:55:00Z
3
value 0.01699
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-08T12:55:00Z
4
value 0.01699
scoring_system epss
scoring_elements 0.82248
published_at 2026-04-04T12:55:00Z
5
value 0.01699
scoring_system epss
scoring_elements 0.82322
published_at 2026-04-21T12:55:00Z
6
value 0.01699
scoring_system epss
scoring_elements 0.8232
published_at 2026-04-18T12:55:00Z
7
value 0.01699
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-13T12:55:00Z
8
value 0.01699
scoring_system epss
scoring_elements 0.82291
published_at 2026-04-12T12:55:00Z
9
value 0.01699
scoring_system epss
scoring_elements 0.82297
published_at 2026-04-11T12:55:00Z
10
value 0.02316
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47952
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47952
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45
reference_id 45
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/
url https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45
4
reference_url https://github.com/MaherAzzouzi/CVE-2022-47952
reference_id CVE-2022-47952
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/
url https://github.com/MaherAzzouzi/CVE-2022-47952
5
reference_url https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274
reference_id lxc.spec.in#L274
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/
url https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274
6
reference_url https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104
reference_id lxc_user_nic.c#L1085-L1104
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/
url https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104
7
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-10T19:15:58Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:5.0.2-1?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2022-47952
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq22-fmtf-8yhs
8
url VCID-xx5x-hgur-xbbj
vulnerability_id VCID-xx5x-hgur-xbbj
summary In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18641
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64667
published_at 2026-04-24T12:55:00Z
1
value 0.00569
scoring_system epss
scoring_elements 0.68503
published_at 2026-04-02T12:55:00Z
2
value 0.00569
scoring_system epss
scoring_elements 0.68521
published_at 2026-04-04T12:55:00Z
3
value 0.00569
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-07T12:55:00Z
4
value 0.00569
scoring_system epss
scoring_elements 0.68549
published_at 2026-04-08T12:55:00Z
5
value 0.00569
scoring_system epss
scoring_elements 0.68567
published_at 2026-04-09T12:55:00Z
6
value 0.00569
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-01T12:55:00Z
7
value 0.00569
scoring_system epss
scoring_elements 0.68581
published_at 2026-04-12T12:55:00Z
8
value 0.00569
scoring_system epss
scoring_elements 0.6855
published_at 2026-04-13T12:55:00Z
9
value 0.00569
scoring_system epss
scoring_elements 0.6859
published_at 2026-04-16T12:55:00Z
10
value 0.00569
scoring_system epss
scoring_elements 0.68602
published_at 2026-04-18T12:55:00Z
11
value 0.00569
scoring_system epss
scoring_elements 0.68579
published_at 2026-04-21T12:55:00Z
12
value 0.00569
scoring_system epss
scoring_elements 0.68593
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18641
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18641
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988730
reference_id 988730
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988730
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:3.0.3-1?distro=trixie
purl pkg:deb/debian/lxc@1:3.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:3.0.3-1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2017-18641
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx5x-hgur-xbbj
9
url VCID-xz1y-a2ay-quc1
vulnerability_id VCID-xz1y-a2ay-quc1
summary lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5985
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25449
published_at 2026-04-24T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25623
published_at 2026-04-01T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25693
published_at 2026-04-02T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-04T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25503
published_at 2026-04-07T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25576
published_at 2026-04-08T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25624
published_at 2026-04-09T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25634
published_at 2026-04-11T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-12T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25536
published_at 2026-04-13T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25541
published_at 2026-04-16T12:55:00Z
11
value 0.0009
scoring_system epss
scoring_elements 0.25525
published_at 2026-04-18T12:55:00Z
12
value 0.0009
scoring_system epss
scoring_elements 0.25495
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5985
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5985
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857295
reference_id 857295
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857295
3
reference_url https://security.archlinux.org/ASA-201705-17
reference_id ASA-201705-17
reference_type
scores
url https://security.archlinux.org/ASA-201705-17
4
reference_url https://security.archlinux.org/AVG-204
reference_id AVG-204
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-204
5
reference_url https://usn.ubuntu.com/3224-1/
reference_id USN-3224-1
reference_type
scores
url https://usn.ubuntu.com/3224-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:2.0.7-2?distro=trixie
purl pkg:deb/debian/lxc@1:2.0.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.7-2%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2017-5985
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz1y-a2ay-quc1
10
url VCID-z74k-px1a-wqa6
vulnerability_id VCID-z74k-px1a-wqa6
summary lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8649
reference_id
reference_type
scores
0
value 0.02154
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-24T12:55:00Z
1
value 0.02154
scoring_system epss
scoring_elements 0.84281
published_at 2026-04-18T12:55:00Z
2
value 0.02154
scoring_system epss
scoring_elements 0.84284
published_at 2026-04-21T12:55:00Z
3
value 0.02154
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-01T12:55:00Z
4
value 0.02154
scoring_system epss
scoring_elements 0.84201
published_at 2026-04-02T12:55:00Z
5
value 0.02154
scoring_system epss
scoring_elements 0.84219
published_at 2026-04-04T12:55:00Z
6
value 0.02154
scoring_system epss
scoring_elements 0.8422
published_at 2026-04-07T12:55:00Z
7
value 0.02154
scoring_system epss
scoring_elements 0.84242
published_at 2026-04-08T12:55:00Z
8
value 0.02154
scoring_system epss
scoring_elements 0.84249
published_at 2026-04-09T12:55:00Z
9
value 0.02154
scoring_system epss
scoring_elements 0.84266
published_at 2026-04-11T12:55:00Z
10
value 0.02154
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-12T12:55:00Z
11
value 0.02154
scoring_system epss
scoring_elements 0.84258
published_at 2026-04-13T12:55:00Z
12
value 0.02154
scoring_system epss
scoring_elements 0.84279
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8649
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
2
reference_url https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1398242
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1398242
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
reference_id
reference_type
scores
url https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
7
reference_url https://security-tracker.debian.org/tracker/CVE-2016-8649
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2016-8649
8
reference_url http://www.securityfocus.com/bid/94498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94498
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-8649
reference_id CVE-2016-8649
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-8649
11
reference_url https://usn.ubuntu.com/3136-1/
reference_id USN-3136-1
reference_type
scores
url https://usn.ubuntu.com/3136-1/
fixed_packages
0
url pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-2%3Fdistro=trixie
1
url pkg:deb/debian/lxc@1:2.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:2.0.6-1%3Fdistro=trixie
2
url pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/lxc@1:4.0.6-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:4.0.6-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/lxc@1:5.0.2-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.4-4%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.4-4%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
purl pkg:deb/debian/lxc@1:6.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:6.0.6-1%3Fdistro=trixie
aliases CVE-2016-8649
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z74k-px1a-wqa6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/lxc@1:5.0.2-1%252Bdeb12u3%3Fdistro=trixie