Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jdxe-krj9-8kax
Summaryapr: Out-of-bounds array deref in apr_time_exp*() functions
Aliases
0
alias CVE-2017-12613
Fixed_packages
0
url pkg:alpm/archlinux/apr@1.6.3-1
purl pkg:alpm/archlinux/apr@1.6.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apr@1.6.3-1
1
url pkg:deb/debian/apr@1.6.3-1?distro=trixie
purl pkg:deb/debian/apr@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.6.3-1%3Fdistro=trixie
2
url pkg:deb/debian/apr@1.6.5-1
purl pkg:deb/debian/apr@1.6.5-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qre-qddd-eqgk
1
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.6.5-1
3
url pkg:deb/debian/apr@1.7.0-6%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/apr@1.7.0-6%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g38k-gh86-pkcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.7.0-6%252Bdeb11u2%3Fdistro=trixie
4
url pkg:deb/debian/apr@1.7.2-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/apr@1.7.2-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.7.2-3%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/apr@1.7.5-1?distro=trixie
purl pkg:deb/debian/apr@1.7.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.7.5-1%3Fdistro=trixie
6
url pkg:deb/debian/apr@1.7.6-3?distro=trixie
purl pkg:deb/debian/apr@1.7.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.7.6-3%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/apr@1.6.2-1
purl pkg:alpm/archlinux/apr@1.6.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apr@1.6.2-1
1
url pkg:deb/debian/apr@1.2.7-8.2
purl pkg:deb/debian/apr@1.2.7-8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-29bh-jatc-73ad
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-3qre-qddd-eqgk
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qebd-7szr-y7cx
5
vulnerability VCID-umuk-3n1q-3qet
6
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.2.7-8.2
2
url pkg:deb/debian/apr@1.2.7-9
purl pkg:deb/debian/apr@1.2.7-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-29bh-jatc-73ad
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-3qre-qddd-eqgk
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qebd-7szr-y7cx
5
vulnerability VCID-umuk-3n1q-3qet
6
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.2.7-9
3
url pkg:deb/debian/apr@1.2.12-5%2Blenny5
purl pkg:deb/debian/apr@1.2.12-5%2Blenny5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-29bh-jatc-73ad
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-3qre-qddd-eqgk
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qebd-7szr-y7cx
5
vulnerability VCID-umuk-3n1q-3qet
6
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.2.12-5%252Blenny5
4
url pkg:deb/debian/apr@1.4.2-6%2Bsqueeze4
purl pkg:deb/debian/apr@1.4.2-6%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-29bh-jatc-73ad
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-3qre-qddd-eqgk
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qebd-7szr-y7cx
5
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.4.2-6%252Bsqueeze4
5
url pkg:deb/debian/apr@1.4.6-3%2Bdeb7u1
purl pkg:deb/debian/apr@1.4.6-3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qre-qddd-eqgk
1
vulnerability VCID-jdxe-krj9-8kax
2
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.4.6-3%252Bdeb7u1
6
url pkg:deb/debian/apr@1.5.1-3
purl pkg:deb/debian/apr@1.5.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qre-qddd-eqgk
1
vulnerability VCID-jdxe-krj9-8kax
2
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.5.1-3
7
url pkg:deb/debian/apr@1.5.2-5
purl pkg:deb/debian/apr@1.5.2-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qre-qddd-eqgk
1
vulnerability VCID-jdxe-krj9-8kax
2
vulnerability VCID-xz52-5z1u-cuf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apr@1.5.2-5
8
url pkg:rpm/redhat/apr@1.3.9-5.el6_4?arch=1
purl pkg:rpm/redhat/apr@1.3.9-5.el6_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.3.9-5.el6_4%3Farch=1
9
url pkg:rpm/redhat/apr@1.3.9-5.el6_5?arch=1
purl pkg:rpm/redhat/apr@1.3.9-5.el6_5?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.3.9-5.el6_5%3Farch=1
10
url pkg:rpm/redhat/apr@1.3.9-5.el6_6?arch=1
purl pkg:rpm/redhat/apr@1.3.9-5.el6_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.3.9-5.el6_6%3Farch=1
11
url pkg:rpm/redhat/apr@1.3.9-5.el6_7?arch=1
purl pkg:rpm/redhat/apr@1.3.9-5.el6_7?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.3.9-5.el6_7%3Farch=1
12
url pkg:rpm/redhat/apr@1.3.9-5.el6_9?arch=1
purl pkg:rpm/redhat/apr@1.3.9-5.el6_9?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.3.9-5.el6_9%3Farch=1
13
url pkg:rpm/redhat/apr@1.4.8-3.el7_2?arch=1
purl pkg:rpm/redhat/apr@1.4.8-3.el7_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.4.8-3.el7_2%3Farch=1
14
url pkg:rpm/redhat/apr@1.4.8-3.el7_3?arch=1
purl pkg:rpm/redhat/apr@1.4.8-3.el7_3?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.4.8-3.el7_3%3Farch=1
15
url pkg:rpm/redhat/apr@1.4.8-3.el7_4?arch=1
purl pkg:rpm/redhat/apr@1.4.8-3.el7_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apr@1.4.8-3.el7_4%3Farch=1
16
url pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6?arch=1
purl pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdxe-krj9-8kax
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6%3Farch=1
17
url pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs?arch=el7
purl pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs%3Farch=el7
18
url pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs?arch=el6
purl pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs%3Farch=el6
19
url pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs?arch=el6
purl pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs%3Farch=el6
20
url pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs?arch=el7
purl pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs%3Farch=el7
21
url pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs?arch=el7
purl pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs%3Farch=el7
22
url pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs?arch=el6
purl pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-5bej-9h7w-33c8
2
vulnerability VCID-fyrq-yg2u-jkc7
3
vulnerability VCID-jdxe-krj9-8kax
4
vulnerability VCID-qayj-kts9-3fde
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs%3Farch=el6
23
url pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7?arch=el6
purl pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7%3Farch=el6
24
url pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7?arch=el7
purl pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7%3Farch=el7
25
url pkg:rpm/redhat/tomcat7@7.0.70-25.ep7?arch=el7
purl pkg:rpm/redhat/tomcat7@7.0.70-25.ep7?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat7@7.0.70-25.ep7%3Farch=el7
26
url pkg:rpm/redhat/tomcat7@7.0.70-25.ep7?arch=el6
purl pkg:rpm/redhat/tomcat7@7.0.70-25.ep7?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat7@7.0.70-25.ep7%3Farch=el6
27
url pkg:rpm/redhat/tomcat8@8.0.36-29.ep7?arch=el7
purl pkg:rpm/redhat/tomcat8@8.0.36-29.ep7?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat8@8.0.36-29.ep7%3Farch=el7
28
url pkg:rpm/redhat/tomcat8@8.0.36-29.ep7?arch=el6
purl pkg:rpm/redhat/tomcat8@8.0.36-29.ep7?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat8@8.0.36-29.ep7%3Farch=el6
29
url pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7?arch=el7
purl pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7%3Farch=el7
30
url pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7?arch=el6
purl pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7%3Farch=el6
31
url pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7?arch=el7
purl pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7%3Farch=el7
32
url pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7?arch=el6
purl pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sbh-sy57-3uez
1
vulnerability VCID-c4jv-ws83-x7g2
2
vulnerability VCID-fjxn-svsf-gqdx
3
vulnerability VCID-g7bk-891a-uufy
4
vulnerability VCID-jdxe-krj9-8kax
5
vulnerability VCID-q6hm-mmfs-zka5
6
vulnerability VCID-vdnj-sqmx-e3ep
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7%3Farch=el6
References
0
reference_url https://access.redhat.com/errata/RHSA-2018:0465
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0465
1
reference_url https://access.redhat.com/errata/RHSA-2018:0466
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0466
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12613.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12613.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12613
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48167
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.4828
published_at 2026-04-18T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48224
published_at 2026-04-09T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48249
published_at 2026-04-11T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48223
published_at 2026-04-12T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48234
published_at 2026-04-13T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-16T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48205
published_at 2026-04-02T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48225
published_at 2026-04-04T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-07T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.4823
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12613
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:M/C:P/I:N/A:P
1
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E
12
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html
14
reference_url https://svn.apache.org/viewvc?view=revision&revision=1807976
reference_id
reference_type
scores
url https://svn.apache.org/viewvc?view=revision&revision=1807976
15
reference_url http://www.apache.org/dist/apr/Announcement1.x.html
reference_id
reference_type
scores
url http://www.apache.org/dist/apr/Announcement1.x.html
16
reference_url http://www.openwall.com/lists/oss-security/2021/08/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/08/23/1
17
reference_url http://www.securityfocus.com/bid/101560
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101560
18
reference_url http://www.securitytracker.com/id/1042004
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1042004
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1506523
reference_id 1506523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1506523
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879708
reference_id 879708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879708
21
reference_url https://security.archlinux.org/ASA-201710-32
reference_id ASA-201710-32
reference_type
scores
url https://security.archlinux.org/ASA-201710-32
22
reference_url https://security.archlinux.org/AVG-469
reference_id AVG-469
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-469
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12613
reference_id CVE-2017-12613
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12613
57
reference_url https://access.redhat.com/errata/RHSA-2017:3270
reference_id RHSA-2017:3270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3270
58
reference_url https://access.redhat.com/errata/RHSA-2017:3475
reference_id RHSA-2017:3475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3475
59
reference_url https://access.redhat.com/errata/RHSA-2017:3476
reference_id RHSA-2017:3476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3476
60
reference_url https://access.redhat.com/errata/RHSA-2017:3477
reference_id RHSA-2017:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3477
61
reference_url https://access.redhat.com/errata/RHSA-2018:0316
reference_id RHSA-2018:0316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0316
62
reference_url https://access.redhat.com/errata/RHSA-2018:1253
reference_id RHSA-2018:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1253
Weaknesses
0
cwe_id 125
name Out-of-bounds Read
description The product reads data past the end, or before the beginning, of the intended buffer.
Exploits
Severity_range_score2.7 - 7.4
Exploitability0.5
Weighted_severity6.7
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jdxe-krj9-8kax