Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@3.10.0-862?arch=el7
Typerpm
Namespaceredhat
Namekernel
Version3.10.0-862
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-18ez-ysdd-sbht
vulnerability_id VCID-18ez-ysdd-sbht
summary kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7294.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7294
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15187
published_at 2026-04-01T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.1505
published_at 2026-04-29T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15014
published_at 2026-04-18T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15066
published_at 2026-04-21T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15104
published_at 2026-04-24T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15109
published_at 2026-04-26T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15226
published_at 2026-04-02T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15294
published_at 2026-04-04T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15097
published_at 2026-04-07T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15185
published_at 2026-04-08T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15236
published_at 2026-04-09T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15206
published_at 2026-04-11T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15167
published_at 2026-04-12T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15103
published_at 2026-04-13T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.15004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:C/A:C
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
reference_id
reference_type
scores
url https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
5
reference_url http://www.securityfocus.com/bid/97177
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97177
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1436798
reference_id 1436798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1436798
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7294
reference_id CVE-2017-7294
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7294
9
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
10
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
11
reference_url https://usn.ubuntu.com/3291-1/
reference_id USN-3291-1
reference_type
scores
url https://usn.ubuntu.com/3291-1/
12
reference_url https://usn.ubuntu.com/3291-2/
reference_id USN-3291-2
reference_type
scores
url https://usn.ubuntu.com/3291-2/
13
reference_url https://usn.ubuntu.com/3291-3/
reference_id USN-3291-3
reference_type
scores
url https://usn.ubuntu.com/3291-3/
14
reference_url https://usn.ubuntu.com/3293-1/
reference_id USN-3293-1
reference_type
scores
url https://usn.ubuntu.com/3293-1/
15
reference_url https://usn.ubuntu.com/3342-1/
reference_id USN-3342-1
reference_type
scores
url https://usn.ubuntu.com/3342-1/
16
reference_url https://usn.ubuntu.com/3342-2/
reference_id USN-3342-2
reference_type
scores
url https://usn.ubuntu.com/3342-2/
17
reference_url https://usn.ubuntu.com/3343-1/
reference_id USN-3343-1
reference_type
scores
url https://usn.ubuntu.com/3343-1/
18
reference_url https://usn.ubuntu.com/3343-2/
reference_id USN-3343-2
reference_type
scores
url https://usn.ubuntu.com/3343-2/
fixed_packages
aliases CVE-2017-7294
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18ez-ysdd-sbht
1
url VCID-1wm7-25yx-gyav
vulnerability_id VCID-1wm7-25yx-gyav
summary kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15127.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15127
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13187
published_at 2026-04-01T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13297
published_at 2026-04-02T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13361
published_at 2026-04-04T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13157
published_at 2026-04-07T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13238
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13288
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13257
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13218
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13166
published_at 2026-04-13T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13066
published_at 2026-04-16T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13068
published_at 2026-04-18T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13163
published_at 2026-04-21T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.1317
published_at 2026-04-24T12:55:00Z
13
value 0.00043
scoring_system epss
scoring_elements 0.1314
published_at 2026-04-26T12:55:00Z
14
value 0.00043
scoring_system epss
scoring_elements 0.13041
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525218
reference_id 1525218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525218
4
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
5
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
fixed_packages
aliases CVE-2017-15127
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wm7-25yx-gyav
2
url VCID-27e6-fez5-byce
vulnerability_id VCID-27e6-fez5-byce
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000004.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000004
reference_id
reference_type
scores
0
value 0.01941
scoring_system epss
scoring_elements 0.8336
published_at 2026-04-01T12:55:00Z
1
value 0.01941
scoring_system epss
scoring_elements 0.83374
published_at 2026-04-02T12:55:00Z
2
value 0.01941
scoring_system epss
scoring_elements 0.83388
published_at 2026-04-07T12:55:00Z
3
value 0.01941
scoring_system epss
scoring_elements 0.83413
published_at 2026-04-08T12:55:00Z
4
value 0.01941
scoring_system epss
scoring_elements 0.83423
published_at 2026-04-09T12:55:00Z
5
value 0.01941
scoring_system epss
scoring_elements 0.83437
published_at 2026-04-11T12:55:00Z
6
value 0.01941
scoring_system epss
scoring_elements 0.83432
published_at 2026-04-12T12:55:00Z
7
value 0.01941
scoring_system epss
scoring_elements 0.83427
published_at 2026-04-13T12:55:00Z
8
value 0.01941
scoring_system epss
scoring_elements 0.83462
published_at 2026-04-16T12:55:00Z
9
value 0.01941
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-21T12:55:00Z
10
value 0.01941
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-24T12:55:00Z
11
value 0.01941
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-26T12:55:00Z
12
value 0.01941
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535315
reference_id 1535315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535315
37
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
38
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
39
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
40
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
41
reference_url https://access.redhat.com/errata/RHSA-2019:1483
reference_id RHSA-2019:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1483
42
reference_url https://access.redhat.com/errata/RHSA-2019:1487
reference_id RHSA-2019:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1487
43
reference_url https://usn.ubuntu.com/3631-1/
reference_id USN-3631-1
reference_type
scores
url https://usn.ubuntu.com/3631-1/
44
reference_url https://usn.ubuntu.com/3631-2/
reference_id USN-3631-2
reference_type
scores
url https://usn.ubuntu.com/3631-2/
45
reference_url https://usn.ubuntu.com/3798-1/
reference_id USN-3798-1
reference_type
scores
url https://usn.ubuntu.com/3798-1/
46
reference_url https://usn.ubuntu.com/3798-2/
reference_id USN-3798-2
reference_type
scores
url https://usn.ubuntu.com/3798-2/
fixed_packages
aliases CVE-2018-1000004
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27e6-fez5-byce
3
url VCID-3ttg-x7ax-2qax
vulnerability_id VCID-3ttg-x7ax-2qax
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
1
reference_url http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis
reference_id
reference_type
scores
url http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182524.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182524.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3672.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3672
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08859
published_at 2026-04-29T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08895
published_at 2026-04-24T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08847
published_at 2026-04-26T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08797
published_at 2026-04-01T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08823
published_at 2026-04-02T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08872
published_at 2026-04-04T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08805
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08883
published_at 2026-04-08T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08909
published_at 2026-04-09T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08908
published_at 2026-04-11T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08876
published_at 2026-04-21T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08862
published_at 2026-04-13T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.0875
published_at 2026-04-16T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08725
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3672
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3961
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244
47
reference_url http://seclists.org/fulldisclosure/2016/Apr/26
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Apr/26
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://github.com/torvalds/linux/commit/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
50
reference_url https://www.exploit-db.com/exploits/39669/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39669/
51
reference_url http://www.debian.org/security/2016/dsa-3607
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3607
52
reference_url http://www.securityfocus.com/archive/1/537996/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/537996/100/0/threaded
53
reference_url http://www.securityfocus.com/bid/85884
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85884
54
reference_url http://www.securitytracker.com/id/1035506
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035506
55
reference_url http://www.ubuntu.com/usn/USN-2989-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2989-1
56
reference_url http://www.ubuntu.com/usn/USN-2996-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2996-1
57
reference_url http://www.ubuntu.com/usn/USN-2997-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2997-1
58
reference_url http://www.ubuntu.com/usn/USN-2998-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2998-1
59
reference_url http://www.ubuntu.com/usn/USN-3000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3000-1
60
reference_url http://www.ubuntu.com/usn/USN-3001-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3001-1
61
reference_url http://www.ubuntu.com/usn/USN-3002-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3002-1
62
reference_url http://www.ubuntu.com/usn/USN-3003-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3003-1
63
reference_url http://www.ubuntu.com/usn/USN-3004-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3004-1
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1324749
reference_id 1324749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1324749
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
76
reference_url http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html
reference_id CVE-2016-3672
reference_type exploit
scores
url http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html
77
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/39669.txt
reference_id CVE-2016-3672
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/39669.txt
78
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3672
reference_id CVE-2016-3672
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3672
79
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
80
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
81
reference_url https://usn.ubuntu.com/2965-1/
reference_id USN-2965-1
reference_type
scores
url https://usn.ubuntu.com/2965-1/
82
reference_url https://usn.ubuntu.com/2965-2/
reference_id USN-2965-2
reference_type
scores
url https://usn.ubuntu.com/2965-2/
83
reference_url https://usn.ubuntu.com/2965-3/
reference_id USN-2965-3
reference_type
scores
url https://usn.ubuntu.com/2965-3/
84
reference_url https://usn.ubuntu.com/2965-4/
reference_id USN-2965-4
reference_type
scores
url https://usn.ubuntu.com/2965-4/
85
reference_url https://usn.ubuntu.com/2989-1/
reference_id USN-2989-1
reference_type
scores
url https://usn.ubuntu.com/2989-1/
86
reference_url https://usn.ubuntu.com/2996-1/
reference_id USN-2996-1
reference_type
scores
url https://usn.ubuntu.com/2996-1/
87
reference_url https://usn.ubuntu.com/2997-1/
reference_id USN-2997-1
reference_type
scores
url https://usn.ubuntu.com/2997-1/
88
reference_url https://usn.ubuntu.com/2998-1/
reference_id USN-2998-1
reference_type
scores
url https://usn.ubuntu.com/2998-1/
89
reference_url https://usn.ubuntu.com/3000-1/
reference_id USN-3000-1
reference_type
scores
url https://usn.ubuntu.com/3000-1/
90
reference_url https://usn.ubuntu.com/3001-1/
reference_id USN-3001-1
reference_type
scores
url https://usn.ubuntu.com/3001-1/
91
reference_url https://usn.ubuntu.com/3002-1/
reference_id USN-3002-1
reference_type
scores
url https://usn.ubuntu.com/3002-1/
92
reference_url https://usn.ubuntu.com/3003-1/
reference_id USN-3003-1
reference_type
scores
url https://usn.ubuntu.com/3003-1/
93
reference_url https://usn.ubuntu.com/3004-1/
reference_id USN-3004-1
reference_type
scores
url https://usn.ubuntu.com/3004-1/
fixed_packages
aliases CVE-2016-3672
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ttg-x7ax-2qax
4
url VCID-4xpk-65pe-ukfa
vulnerability_id VCID-4xpk-65pe-ukfa
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14140.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14140
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21507
published_at 2026-04-29T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.2152
published_at 2026-04-26T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21834
published_at 2026-04-02T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21887
published_at 2026-04-04T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21756
published_at 2026-04-12T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21699
published_at 2026-04-16T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21706
published_at 2026-04-18T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488329
reference_id 1488329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488329
20
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
21
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
22
reference_url https://usn.ubuntu.com/3444-1/
reference_id USN-3444-1
reference_type
scores
url https://usn.ubuntu.com/3444-1/
23
reference_url https://usn.ubuntu.com/3444-2/
reference_id USN-3444-2
reference_type
scores
url https://usn.ubuntu.com/3444-2/
24
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
25
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-14140
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xpk-65pe-ukfa
5
url VCID-4z4a-3uyc-47f1
vulnerability_id VCID-4z4a-3uyc-47f1
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12154.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12154.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12154
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10504
published_at 2026-04-01T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10557
published_at 2026-04-29T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10519
published_at 2026-04-16T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10536
published_at 2026-04-18T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10662
published_at 2026-04-21T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10614
published_at 2026-04-24T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10611
published_at 2026-04-26T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10646
published_at 2026-04-02T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10708
published_at 2026-04-04T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10567
published_at 2026-04-07T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.1064
published_at 2026-04-08T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10697
published_at 2026-04-09T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10711
published_at 2026-04-11T12:55:00Z
13
value 0.00036
scoring_system epss
scoring_elements 0.10679
published_at 2026-04-12T12:55:00Z
14
value 0.00036
scoring_system epss
scoring_elements 0.10655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12154
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
21
reference_url https://www.spinics.net/lists/kvm/msg155414.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/kvm/msg155414.html
22
reference_url http://www.debian.org/security/2017/dsa-3981
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3981
23
reference_url http://www.securityfocus.com/bid/100856
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100856
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1491224
reference_id 1491224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1491224
25
reference_url https://security.archlinux.org/AVG-417
reference_id AVG-417
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-417
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12154
reference_id CVE-2017-12154
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-12154
28
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
29
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
30
reference_url https://access.redhat.com/errata/RHSA-2019:1946
reference_id RHSA-2019:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1946
31
reference_url https://usn.ubuntu.com/3469-1/
reference_id USN-3469-1
reference_type
scores
url https://usn.ubuntu.com/3469-1/
32
reference_url https://usn.ubuntu.com/3469-2/
reference_id USN-3469-2
reference_type
scores
url https://usn.ubuntu.com/3469-2/
33
reference_url https://usn.ubuntu.com/3487-1/
reference_id USN-3487-1
reference_type
scores
url https://usn.ubuntu.com/3487-1/
34
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
35
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2017-12154
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4z4a-3uyc-47f1
6
url VCID-6yd5-dczd-83f4
vulnerability_id VCID-6yd5-dczd-83f4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
1
reference_url http://lists.openwall.net/netdev/2017/12/04/224
reference_id
reference_type
scores
url http://lists.openwall.net/netdev/2017/12/04/224
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8824.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8824.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8824
reference_id
reference_type
scores
0
value 0.00851
scoring_system epss
scoring_elements 0.74849
published_at 2026-04-01T12:55:00Z
1
value 0.00851
scoring_system epss
scoring_elements 0.74971
published_at 2026-04-29T12:55:00Z
2
value 0.00851
scoring_system epss
scoring_elements 0.74922
published_at 2026-04-11T12:55:00Z
3
value 0.00851
scoring_system epss
scoring_elements 0.749
published_at 2026-04-12T12:55:00Z
4
value 0.00851
scoring_system epss
scoring_elements 0.7489
published_at 2026-04-13T12:55:00Z
5
value 0.00851
scoring_system epss
scoring_elements 0.74927
published_at 2026-04-16T12:55:00Z
6
value 0.00851
scoring_system epss
scoring_elements 0.74934
published_at 2026-04-18T12:55:00Z
7
value 0.00851
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-21T12:55:00Z
8
value 0.00851
scoring_system epss
scoring_elements 0.74962
published_at 2026-04-24T12:55:00Z
9
value 0.00851
scoring_system epss
scoring_elements 0.74967
published_at 2026-04-26T12:55:00Z
10
value 0.00851
scoring_system epss
scoring_elements 0.7485
published_at 2026-04-02T12:55:00Z
11
value 0.00851
scoring_system epss
scoring_elements 0.74879
published_at 2026-04-04T12:55:00Z
12
value 0.00851
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-07T12:55:00Z
13
value 0.00851
scoring_system epss
scoring_elements 0.74885
published_at 2026-04-08T12:55:00Z
14
value 0.00851
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
27
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
28
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
29
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
30
reference_url https://www.exploit-db.com/exploits/43234/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43234/
31
reference_url http://www.securityfocus.com/bid/102056
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102056
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519591
reference_id 1519591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519591
33
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
34
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
35
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
36
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
37
reference_url https://security.archlinux.org/AVG-566
reference_id AVG-566
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-566
38
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
39
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43234.c
reference_id CVE-2017-8824
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43234.c
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8824
reference_id CVE-2017-8824
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8824
43
reference_url http://www.openwall.com/lists/oss-security/2017/12/05/1
reference_id CVE-2017-8824
reference_type exploit
scores
url http://www.openwall.com/lists/oss-security/2017/12/05/1
44
reference_url https://access.redhat.com/errata/RHSA-2018:0399
reference_id RHSA-2018:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0399
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
48
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
49
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
50
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
51
reference_url https://access.redhat.com/errata/RHSA-2018:3822
reference_id RHSA-2018:3822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3822
52
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
url https://usn.ubuntu.com/3581-1/
53
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
url https://usn.ubuntu.com/3581-2/
54
reference_url https://usn.ubuntu.com/3581-3/
reference_id USN-3581-3
reference_type
scores
url https://usn.ubuntu.com/3581-3/
55
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
url https://usn.ubuntu.com/3582-1/
56
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
url https://usn.ubuntu.com/3582-2/
57
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
58
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-8824
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yd5-dczd-83f4
7
url VCID-7vg7-s9d7-kff2
vulnerability_id VCID-7vg7-s9d7-kff2
summary kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13305.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13305
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29592
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29659
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.2953
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.2963
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29588
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29536
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29554
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29527
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29481
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29368
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29254
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29189
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13305
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581637
reference_id 1581637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581637
5
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
6
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
7
reference_url https://access.redhat.com/errata/RHSA-2018:2165
reference_id RHSA-2018:2165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2165
8
reference_url https://usn.ubuntu.com/3631-1/
reference_id USN-3631-1
reference_type
scores
url https://usn.ubuntu.com/3631-1/
9
reference_url https://usn.ubuntu.com/3631-2/
reference_id USN-3631-2
reference_type
scores
url https://usn.ubuntu.com/3631-2/
10
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
11
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
fixed_packages
aliases CVE-2017-13305
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vg7-s9d7-kff2
8
url VCID-9qez-qbb3-7qcp
vulnerability_id VCID-9qez-qbb3-7qcp
summary kernel: net: double-free and memory corruption in get_net_ns_by_id()
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15129.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15129.json
2
reference_url https://access.redhat.com/security/cve/CVE-2017-15129
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2017-15129
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15129
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23159
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23004
published_at 2026-04-29T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23187
published_at 2026-04-21T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23014
published_at 2026-04-24T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23007
published_at 2026-04-26T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23337
published_at 2026-04-02T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.2338
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23169
published_at 2026-04-07T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23242
published_at 2026-04-08T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23292
published_at 2026-04-09T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23314
published_at 2026-04-11T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23276
published_at 2026-04-12T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23219
published_at 2026-04-13T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.23235
published_at 2026-04-16T12:55:00Z
14
value 0.00078
scoring_system epss
scoring_elements 0.23226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129
5
reference_url http://seclists.org/oss-sec/2018/q1/7
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2018/q1/7
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
8
reference_url https://marc.info/?l=linux-netdev&m=151370451121029&w=2
reference_id
reference_type
scores
url https://marc.info/?l=linux-netdev&m=151370451121029&w=2
9
reference_url https://marc.info/?t=151370468900001&r=1&w=2
reference_id
reference_type
scores
url https://marc.info/?t=151370468900001&r=1&w=2
10
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
11
reference_url http://www.securityfocus.com/bid/102485
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102485
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1531174
reference_id 1531174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1531174
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15129
reference_id CVE-2017-15129
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15129
44
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2019:1946
reference_id RHSA-2019:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1946
48
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
49
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
50
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
51
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
52
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
53
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-15129
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qez-qbb3-7qcp
9
url VCID-a6md-wqt8-cbhh
vulnerability_id VCID-a6md-wqt8-cbhh
summary kernel: memory leak when merging buffers in SCSI IO vectors
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
1
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12190
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22523
published_at 2026-04-29T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.2282
published_at 2026-04-11T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22782
published_at 2026-04-12T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22725
published_at 2026-04-13T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22741
published_at 2026-04-16T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22736
published_at 2026-04-18T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-21T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-24T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22525
published_at 2026-04-26T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25999
published_at 2026-04-09T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25985
published_at 2026-04-01T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-02T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.26109
published_at 2026-04-04T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-07T12:55:00Z
14
value 0.00092
scoring_system epss
scoring_elements 0.25947
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12190
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190
5
reference_url http://seclists.org/oss-sec/2017/q4/52
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2017/q4/52
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:M/C:N/I:N/A:C
1
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
8
reference_url https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467
9
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
10
reference_url https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS
11
reference_url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
12
reference_url http://www.securityfocus.com/bid/101911
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101911
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1495089
reference_id 1495089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1495089
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12190
reference_id CVE-2017-12190
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12190
16
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
17
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
18
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
19
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
20
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
21
reference_url https://access.redhat.com/errata/RHSA-2019:1190
reference_id RHSA-2019:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1190
22
reference_url https://usn.ubuntu.com/3487-1/
reference_id USN-3487-1
reference_type
scores
url https://usn.ubuntu.com/3487-1/
23
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
url https://usn.ubuntu.com/3582-1/
24
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
url https://usn.ubuntu.com/3582-2/
25
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
26
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-12190
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6md-wqt8-cbhh
10
url VCID-akwn-9252-ufdn
vulnerability_id VCID-akwn-9252-ufdn
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
1
reference_url http://openwall.com/lists/oss-security/2017/12/12/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/12/12/7
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17558.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17558.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17558
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22095
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21916
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22235
published_at 2026-04-11T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22194
published_at 2026-04-12T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22134
published_at 2026-04-13T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22133
published_at 2026-04-16T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22128
published_at 2026-04-18T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22082
published_at 2026-04-21T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.21942
published_at 2026-04-24T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.21929
published_at 2026-04-26T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22249
published_at 2026-04-02T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22295
published_at 2026-04-04T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22079
published_at 2026-04-07T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.2216
published_at 2026-04-08T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17558
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
27
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
28
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
29
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
30
reference_url https://www.spinics.net/lists/linux-usb/msg163644.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/linux-usb/msg163644.html
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525474
reference_id 1525474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525474
32
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
33
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
34
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
35
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
36
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
37
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
38
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
39
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17558
reference_id CVE-2017-17558
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17558
44
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
45
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
46
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
47
reference_url https://access.redhat.com/errata/RHSA-2019:1190
reference_id RHSA-2019:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1190
48
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
49
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
50
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2017-17558
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-akwn-9252-ufdn
11
url VCID-dtrq-wkdm-2qg8
vulnerability_id VCID-dtrq-wkdm-2qg8
summary kernel: Buffer overflow in firewire driver via crafted incoming packets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8633.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8633
reference_id
reference_type
scores
0
value 0.00927
scoring_system epss
scoring_elements 0.75997
published_at 2026-04-01T12:55:00Z
1
value 0.00927
scoring_system epss
scoring_elements 0.76146
published_at 2026-04-29T12:55:00Z
2
value 0.00927
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-24T12:55:00Z
3
value 0.00927
scoring_system epss
scoring_elements 0.76135
published_at 2026-04-26T12:55:00Z
4
value 0.00927
scoring_system epss
scoring_elements 0.76
published_at 2026-04-02T12:55:00Z
5
value 0.00927
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-04T12:55:00Z
6
value 0.00927
scoring_system epss
scoring_elements 0.76012
published_at 2026-04-07T12:55:00Z
7
value 0.00927
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-08T12:55:00Z
8
value 0.00927
scoring_system epss
scoring_elements 0.76059
published_at 2026-04-09T12:55:00Z
9
value 0.00927
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-11T12:55:00Z
10
value 0.00927
scoring_system epss
scoring_elements 0.76061
published_at 2026-04-12T12:55:00Z
11
value 0.00927
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-13T12:55:00Z
12
value 0.00927
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-16T12:55:00Z
13
value 0.00927
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-18T12:55:00Z
14
value 0.00927
scoring_system epss
scoring_elements 0.76086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8633
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391490
reference_id 1391490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391490
5
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
6
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
7
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
8
reference_url https://access.redhat.com/errata/RHSA-2019:1190
reference_id RHSA-2019:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1190
9
reference_url https://usn.ubuntu.com/3161-1/
reference_id USN-3161-1
reference_type
scores
url https://usn.ubuntu.com/3161-1/
10
reference_url https://usn.ubuntu.com/3161-2/
reference_id USN-3161-2
reference_type
scores
url https://usn.ubuntu.com/3161-2/
11
reference_url https://usn.ubuntu.com/3161-3/
reference_id USN-3161-3
reference_type
scores
url https://usn.ubuntu.com/3161-3/
12
reference_url https://usn.ubuntu.com/3161-4/
reference_id USN-3161-4
reference_type
scores
url https://usn.ubuntu.com/3161-4/
13
reference_url https://usn.ubuntu.com/3162-1/
reference_id USN-3162-1
reference_type
scores
url https://usn.ubuntu.com/3162-1/
14
reference_url https://usn.ubuntu.com/3162-2/
reference_id USN-3162-2
reference_type
scores
url https://usn.ubuntu.com/3162-2/
15
reference_url https://usn.ubuntu.com/3445-1/
reference_id USN-3445-1
reference_type
scores
url https://usn.ubuntu.com/3445-1/
16
reference_url https://usn.ubuntu.com/3445-2/
reference_id USN-3445-2
reference_type
scores
url https://usn.ubuntu.com/3445-2/
fixed_packages
aliases CVE-2016-8633
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtrq-wkdm-2qg8
12
url VCID-gmnr-pxsk-akd6
vulnerability_id VCID-gmnr-pxsk-akd6
summary kernel: dereferencing NULL payload with nonzero length
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5649645d725c73df4302428ee4e02c869248b4c5
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5649645d725c73df4302428ee4e02c869248b4c5
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15274.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15274.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15274
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22703
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22562
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22777
published_at 2026-04-18T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22736
published_at 2026-04-21T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22574
published_at 2026-04-24T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-26T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22878
published_at 2026-04-02T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22923
published_at 2026-04-04T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22714
published_at 2026-04-07T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22789
published_at 2026-04-08T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22841
published_at 2026-04-09T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22862
published_at 2026-04-11T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22825
published_at 2026-04-12T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22769
published_at 2026-04-13T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22783
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15274
3
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1045327
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1045327
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/5649645d725c73df4302428ee4e02c869248b4c5
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/5649645d725c73df4302428ee4e02c869248b4c5
7
reference_url https://patchwork.kernel.org/patch/9781573/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/9781573/
8
reference_url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
9
reference_url http://www.securityfocus.com/bid/101292
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101292
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500391
reference_id 1500391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500391
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15274
reference_id CVE-2017-15274
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15274
13
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
14
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
15
reference_url https://access.redhat.com/errata/RHSA-2019:1946
reference_id RHSA-2019:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1946
16
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
17
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-15274
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmnr-pxsk-akd6
13
url VCID-hm1p-34gm-k7fj
vulnerability_id VCID-hm1p-34gm-k7fj
summary kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
1
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000252.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000252.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000252
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24259
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24031
published_at 2026-04-29T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24233
published_at 2026-04-18T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24208
published_at 2026-04-21T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24086
published_at 2026-04-24T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24074
published_at 2026-04-26T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24386
published_at 2026-04-02T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24419
published_at 2026-04-04T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24203
published_at 2026-04-07T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-08T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24313
published_at 2026-04-09T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24329
published_at 2026-04-11T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24287
published_at 2026-04-12T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24229
published_at 2026-04-13T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24245
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000252
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
7
reference_url https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
8
reference_url https://marc.info/?l=kvm&m=150549145711115&w=2
reference_id
reference_type
scores
url https://marc.info/?l=kvm&m=150549145711115&w=2
9
reference_url https://marc.info/?l=kvm&m=150549146311117&w=2
reference_id
reference_type
scores
url https://marc.info/?l=kvm&m=150549146311117&w=2
10
reference_url http://www.debian.org/security/2017/dsa-3981
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3981
11
reference_url http://www.openwall.com/lists/oss-security/2017/09/15/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/09/15/4
12
reference_url http://www.securityfocus.com/bid/101022
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101022
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1490781
reference_id 1490781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1490781
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000252
reference_id CVE-2017-1000252
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000252
16
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
17
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
18
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
19
reference_url https://usn.ubuntu.com/3468-1/
reference_id USN-3468-1
reference_type
scores
url https://usn.ubuntu.com/3468-1/
20
reference_url https://usn.ubuntu.com/3468-2/
reference_id USN-3468-2
reference_type
scores
url https://usn.ubuntu.com/3468-2/
21
reference_url https://usn.ubuntu.com/3468-3/
reference_id USN-3468-3
reference_type
scores
url https://usn.ubuntu.com/3468-3/
fixed_packages
aliases CVE-2017-1000252
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hm1p-34gm-k7fj
14
url VCID-k6c5-xmxd-j3en
vulnerability_id VCID-k6c5-xmxd-j3en
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17448.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17448
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21084
published_at 2026-04-01T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.20923
published_at 2026-04-29T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21194
published_at 2026-04-11T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21152
published_at 2026-04-12T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.211
published_at 2026-04-13T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21091
published_at 2026-04-16T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21102
published_at 2026-04-18T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.2108
published_at 2026-04-21T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.20953
published_at 2026-04-24T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.20956
published_at 2026-04-26T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21237
published_at 2026-04-02T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.2129
published_at 2026-04-04T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21041
published_at 2026-04-07T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21123
published_at 2026-04-08T12:55:00Z
14
value 0.00069
scoring_system epss
scoring_elements 0.21184
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:P
1
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://patchwork.kernel.org/patch/10089373/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/10089373/
25
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
26
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
27
reference_url http://www.securityfocus.com/bid/102117
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102117
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525768
reference_id 1525768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525768
29
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
30
reference_url https://security.archlinux.org/AVG-567
reference_id AVG-567
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-567
31
reference_url https://security.archlinux.org/AVG-572
reference_id AVG-572
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-572
32
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
33
reference_url https://security.archlinux.org/AVG-993
reference_id AVG-993
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-993
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17448
reference_id CVE-2017-17448
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17448
36
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
37
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
38
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
39
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
40
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
41
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
42
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
43
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
44
reference_url https://usn.ubuntu.com/3620-1/
reference_id USN-3620-1
reference_type
scores
url https://usn.ubuntu.com/3620-1/
45
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
url https://usn.ubuntu.com/3620-2/
46
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-17448
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6c5-xmxd-j3en
15
url VCID-kadh-crsg-vkhg
vulnerability_id VCID-kadh-crsg-vkhg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18203
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16675
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16845
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16902
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16686
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16771
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16825
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16804
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1676
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16702
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16639
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16646
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16684
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16586
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16575
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16541
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550811
reference_id 1550811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550811
37
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
38
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
39
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
40
reference_url https://access.redhat.com/errata/RHSA-2019:4154
reference_id RHSA-2019:4154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4154
41
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
42
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
43
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
44
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
45
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
46
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
47
reference_url https://usn.ubuntu.com/3657-1/
reference_id USN-3657-1
reference_type
scores
url https://usn.ubuntu.com/3657-1/
fixed_packages
aliases CVE-2017-18203
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kadh-crsg-vkhg
16
url VCID-kgdm-euqp-8uac
vulnerability_id VCID-kgdm-euqp-8uac
summary kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15121
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21198
published_at 2026-04-01T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21044
published_at 2026-04-29T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21217
published_at 2026-04-18T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21193
published_at 2026-04-21T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21066
published_at 2026-04-24T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21069
published_at 2026-04-26T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21349
published_at 2026-04-02T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21404
published_at 2026-04-04T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21156
published_at 2026-04-07T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21235
published_at 2026-04-08T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21297
published_at 2026-04-09T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21307
published_at 2026-04-11T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21267
published_at 2026-04-12T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21213
published_at 2026-04-13T12:55:00Z
14
value 0.00069
scoring_system epss
scoring_elements 0.21207
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15121
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.f5.com/csp/article/K42142782?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K42142782?utm_source=f5support&amp%3Butm_medium=RSS
5
reference_url http://www.securityfocus.com/bid/102128
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102128
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1520893
reference_id 1520893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1520893
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15121
reference_id CVE-2017-15121
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15121
19
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
20
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
21
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
fixed_packages
aliases CVE-2017-15121
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgdm-euqp-8uac
17
url VCID-ns96-hjx6-bya7
vulnerability_id VCID-ns96-hjx6-bya7
summary kernel: improper keyrings creation
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=237bbd29f7a049d310d907f4b2716a7feef9abf3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18270.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18270.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18270
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22215
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22047
published_at 2026-04-29T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22223
published_at 2026-04-21T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22073
published_at 2026-04-24T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2206
published_at 2026-04-26T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22383
published_at 2026-04-02T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22428
published_at 2026-04-04T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-07T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22299
published_at 2026-04-08T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22354
published_at 2026-04-09T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-11T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22333
published_at 2026-04-12T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22274
published_at 2026-04-13T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22278
published_at 2026-04-16T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18270
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c11
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c11
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c9
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856774#c9
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18270
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/237bbd29f7a049d310d907f4b2716a7feef9abf3
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/237bbd29f7a049d310d907f4b2716a7feef9abf3
8
reference_url https://support.f5.com/csp/article/K37301725
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K37301725
9
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5
10
reference_url http://www.securityfocus.com/bid/104254
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104254
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1580979
reference_id 1580979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1580979
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18270
reference_id CVE-2017-18270
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18270
14
reference_url https://access.redhat.com/errata/RHSA-2018:0412
reference_id RHSA-2018:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0412
15
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
16
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2017-18270
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ns96-hjx6-bya7
18
url VCID-ntkd-qx7n-vkaf
vulnerability_id VCID-ntkd-qx7n-vkaf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6927.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6927
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06937
published_at 2026-04-29T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0691
published_at 2026-04-13T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06849
published_at 2026-04-16T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06832
published_at 2026-04-18T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06978
published_at 2026-04-21T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06965
published_at 2026-04-24T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06969
published_at 2026-04-26T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08797
published_at 2026-04-09T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08766
published_at 2026-04-12T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08693
published_at 2026-04-01T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08799
published_at 2026-04-11T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08722
published_at 2026-04-02T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08769
published_at 2026-04-04T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08695
published_at 2026-04-07T12:55:00Z
14
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6927
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544612
reference_id 1544612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544612
37
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
38
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
39
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
40
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
41
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
42
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
43
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
44
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
45
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-6927
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntkd-qx7n-vkaf
19
url VCID-pd2f-8535-97hg
vulnerability_id VCID-pd2f-8535-97hg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000407.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000407.json
1
reference_url https://access.redhat.com/security/cve/cve-2017-1000407
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2017-1000407
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000407
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.63915
published_at 2026-04-01T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.64061
published_at 2026-04-29T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.64029
published_at 2026-04-09T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.64041
published_at 2026-04-11T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.64027
published_at 2026-04-12T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.63997
published_at 2026-04-13T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.64032
published_at 2026-04-21T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64044
published_at 2026-04-18T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64051
published_at 2026-04-24T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64063
published_at 2026-04-26T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.63974
published_at 2026-04-02T12:55:00Z
11
value 0.00458
scoring_system epss
scoring_elements 0.64002
published_at 2026-04-04T12:55:00Z
12
value 0.00458
scoring_system epss
scoring_elements 0.63961
published_at 2026-04-07T12:55:00Z
13
value 0.00458
scoring_system epss
scoring_elements 0.64011
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
26
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
27
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
28
reference_url https://www.spinics.net/lists/kvm/msg159809.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/kvm/msg159809.html
29
reference_url http://www.openwall.com/lists/oss-security/2017/12/04/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/12/04/2
30
reference_url http://www.securityfocus.com/bid/102038
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102038
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1520328
reference_id 1520328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1520328
32
reference_url https://security.archlinux.org/AVG-562
reference_id AVG-562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-562
33
reference_url https://security.archlinux.org/AVG-563
reference_id AVG-563
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-563
34
reference_url https://security.archlinux.org/AVG-564
reference_id AVG-564
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-564
35
reference_url https://security.archlinux.org/AVG-565
reference_id AVG-565
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-565
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000407
reference_id CVE-2017-1000407
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:N/A:C
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000407
54
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
55
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
56
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
57
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
58
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
59
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
60
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
61
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
62
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
63
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-1000407
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pd2f-8535-97hg
20
url VCID-pjxd-c7gv-b3dp
vulnerability_id VCID-pjxd-c7gv-b3dp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1066.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1066
reference_id
reference_type
scores
0
value 0.05036
scoring_system epss
scoring_elements 0.89708
published_at 2026-04-01T12:55:00Z
1
value 0.05036
scoring_system epss
scoring_elements 0.89712
published_at 2026-04-02T12:55:00Z
2
value 0.05036
scoring_system epss
scoring_elements 0.89727
published_at 2026-04-04T12:55:00Z
3
value 0.05036
scoring_system epss
scoring_elements 0.89729
published_at 2026-04-07T12:55:00Z
4
value 0.05036
scoring_system epss
scoring_elements 0.89746
published_at 2026-04-08T12:55:00Z
5
value 0.05036
scoring_system epss
scoring_elements 0.89753
published_at 2026-04-09T12:55:00Z
6
value 0.05036
scoring_system epss
scoring_elements 0.8976
published_at 2026-04-11T12:55:00Z
7
value 0.05036
scoring_system epss
scoring_elements 0.89758
published_at 2026-04-12T12:55:00Z
8
value 0.05036
scoring_system epss
scoring_elements 0.89751
published_at 2026-04-13T12:55:00Z
9
value 0.05036
scoring_system epss
scoring_elements 0.89768
published_at 2026-04-18T12:55:00Z
10
value 0.05036
scoring_system epss
scoring_elements 0.89762
published_at 2026-04-21T12:55:00Z
11
value 0.05036
scoring_system epss
scoring_elements 0.89777
published_at 2026-04-29T12:55:00Z
12
value 0.05036
scoring_system epss
scoring_elements 0.89778
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539599
reference_id 1539599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539599
48
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
49
reference_url https://usn.ubuntu.com/3880-1/
reference_id USN-3880-1
reference_type
scores
url https://usn.ubuntu.com/3880-1/
50
reference_url https://usn.ubuntu.com/3880-2/
reference_id USN-3880-2
reference_type
scores
url https://usn.ubuntu.com/3880-2/
fixed_packages
aliases CVE-2018-1066
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjxd-c7gv-b3dp
21
url VCID-q688-4s7w-tbg8
vulnerability_id VCID-q688-4s7w-tbg8
summary kernel: Incorrect type conversion for size during dma allocation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9725.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9725
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39849
published_at 2026-04-29T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40196
published_at 2026-04-18T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-21T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-24T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.39929
published_at 2026-04-26T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40209
published_at 2026-04-08T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40234
published_at 2026-04-04T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40156
published_at 2026-04-07T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40195
published_at 2026-04-12T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40176
published_at 2026-04-13T12:55:00Z
13
value 0.00184
scoring_system epss
scoring_elements 0.40226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/2017-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-09-01
5
reference_url http://www.securityfocus.com/bid/100658
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100658
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1489088
reference_id 1489088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1489088
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-9725
reference_id CVE-2017-9725
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-9725
9
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
10
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
11
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
12
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
fixed_packages
aliases CVE-2017-9725
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q688-4s7w-tbg8
22
url VCID-r5uv-213t-pufd
vulnerability_id VCID-r5uv-213t-pufd
summary kernel: media: use-after-free in [tuner-xc2028] media driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7913.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7913.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7913
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64296
published_at 2026-04-29T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64262
published_at 2026-04-21T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64282
published_at 2026-04-24T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67407
published_at 2026-04-02T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-04T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.67408
published_at 2026-04-07T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.6746
published_at 2026-04-08T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.67474
published_at 2026-04-09T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67496
published_at 2026-04-11T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.67483
published_at 2026-04-12T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.6745
published_at 2026-04-13T12:55:00Z
11
value 0.00535
scoring_system epss
scoring_elements 0.67485
published_at 2026-04-16T12:55:00Z
12
value 0.00535
scoring_system epss
scoring_elements 0.67497
published_at 2026-04-18T12:55:00Z
13
value 0.00535
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7913
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1402885
reference_id 1402885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1402885
5
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
6
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
7
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
8
reference_url https://access.redhat.com/errata/RHSA-2019:1190
reference_id RHSA-2019:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1190
9
reference_url https://usn.ubuntu.com/3312-1/
reference_id USN-3312-1
reference_type
scores
url https://usn.ubuntu.com/3312-1/
10
reference_url https://usn.ubuntu.com/3312-2/
reference_id USN-3312-2
reference_type
scores
url https://usn.ubuntu.com/3312-2/
11
reference_url https://usn.ubuntu.com/3798-1/
reference_id USN-3798-1
reference_type
scores
url https://usn.ubuntu.com/3798-1/
12
reference_url https://usn.ubuntu.com/3798-2/
reference_id USN-3798-2
reference_type
scores
url https://usn.ubuntu.com/3798-2/
fixed_packages
aliases CVE-2016-7913
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5uv-213t-pufd
23
url VCID-rgt3-wkaw-eqca
vulnerability_id VCID-rgt3-wkaw-eqca
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5754
reference_id
reference_type
scores
0
value 0.87621
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-09T12:55:00Z
1
value 0.87621
scoring_system epss
scoring_elements 0.9947
published_at 2026-04-18T12:55:00Z
2
value 0.87621
scoring_system epss
scoring_elements 0.99469
published_at 2026-04-16T12:55:00Z
3
value 0.87621
scoring_system epss
scoring_elements 0.99466
published_at 2026-04-13T12:55:00Z
4
value 0.87621
scoring_system epss
scoring_elements 0.99465
published_at 2026-04-12T12:55:00Z
5
value 0.87752
scoring_system epss
scoring_elements 0.99466
published_at 2026-04-07T12:55:00Z
6
value 0.87752
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-01T12:55:00Z
7
value 0.87752
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-02T12:55:00Z
8
value 0.87752
scoring_system epss
scoring_elements 0.99464
published_at 2026-04-04T12:55:00Z
9
value 0.87752
scoring_system epss
scoring_elements 0.99467
published_at 2026-04-08T12:55:00Z
10
value 0.88229
scoring_system epss
scoring_elements 0.99495
published_at 2026-04-21T12:55:00Z
11
value 0.8869
scoring_system epss
scoring_elements 0.99518
published_at 2026-04-29T12:55:00Z
12
value 0.8869
scoring_system epss
scoring_elements 0.99517
published_at 2026-04-26T12:55:00Z
13
value 0.88802
scoring_system epss
scoring_elements 0.99522
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519781
reference_id 1519781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519781
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
22
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
23
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
24
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
25
reference_url https://security.archlinux.org/ASA-201801-6
reference_id ASA-201801-6
reference_type
scores
url https://security.archlinux.org/ASA-201801-6
26
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
27
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
28
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
29
reference_url https://security.archlinux.org/AVG-577
reference_id AVG-577
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-577
30
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
31
reference_url https://access.redhat.com/errata/RHSA-2018:0010
reference_id RHSA-2018:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0010
32
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
33
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
34
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
35
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
36
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
37
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
38
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0292
39
reference_url https://access.redhat.com/errata/RHSA-2018:0464
reference_id RHSA-2018:0464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0464
40
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
41
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
42
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
43
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
44
reference_url https://access.redhat.com/errata/RHSA-2018:1374
reference_id RHSA-2018:1374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1374
45
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
46
reference_url https://usn.ubuntu.com/3522-1/
reference_id USN-3522-1
reference_type
scores
url https://usn.ubuntu.com/3522-1/
47
reference_url https://usn.ubuntu.com/3522-2/
reference_id USN-3522-2
reference_type
scores
url https://usn.ubuntu.com/3522-2/
48
reference_url https://usn.ubuntu.com/3523-1/
reference_id USN-3523-1
reference_type
scores
url https://usn.ubuntu.com/3523-1/
49
reference_url https://usn.ubuntu.com/3523-2/
reference_id USN-3523-2
reference_type
scores
url https://usn.ubuntu.com/3523-2/
50
reference_url https://usn.ubuntu.com/3524-1/
reference_id USN-3524-1
reference_type
scores
url https://usn.ubuntu.com/3524-1/
51
reference_url https://usn.ubuntu.com/3524-2/
reference_id USN-3524-2
reference_type
scores
url https://usn.ubuntu.com/3524-2/
52
reference_url https://usn.ubuntu.com/3525-1/
reference_id USN-3525-1
reference_type
scores
url https://usn.ubuntu.com/3525-1/
53
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
54
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
url https://usn.ubuntu.com/3540-2/
55
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
56
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
url https://usn.ubuntu.com/3541-2/
57
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
58
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
url https://usn.ubuntu.com/3597-1/
59
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
url https://usn.ubuntu.com/3597-2/
60
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
aliases CVE-2017-5754
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgt3-wkaw-eqca
24
url VCID-rp5f-d4xg-mbhe
vulnerability_id VCID-rp5f-d4xg-mbhe
summary kernel: Null pointer dereference in rngapi_reset function
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15116.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15116.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15116
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14238
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14083
published_at 2026-04-29T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14065
published_at 2026-04-18T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14142
published_at 2026-04-21T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14176
published_at 2026-04-24T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14152
published_at 2026-04-26T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14316
published_at 2026-04-02T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.1438
published_at 2026-04-04T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14187
published_at 2026-04-07T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14269
published_at 2026-04-08T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14323
published_at 2026-04-09T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.1427
published_at 2026-04-11T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14231
published_at 2026-04-12T12:55:00Z
13
value 0.00046
scoring_system epss
scoring_elements 0.14175
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15116
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1485815
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1485815
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15116
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1514609
reference_id 1514609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1514609
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15116
reference_id CVE-2017-15116
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15116
11
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
12
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
fixed_packages
aliases CVE-2017-15116
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rp5f-d4xg-mbhe
25
url VCID-smpk-tkz2-7uc4
vulnerability_id VCID-smpk-tkz2-7uc4
summary kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15126.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15126
reference_id
reference_type
scores
0
value 0.01146
scoring_system epss
scoring_elements 0.78413
published_at 2026-04-01T12:55:00Z
1
value 0.01146
scoring_system epss
scoring_elements 0.78419
published_at 2026-04-02T12:55:00Z
2
value 0.01146
scoring_system epss
scoring_elements 0.7845
published_at 2026-04-04T12:55:00Z
3
value 0.01146
scoring_system epss
scoring_elements 0.78433
published_at 2026-04-07T12:55:00Z
4
value 0.01146
scoring_system epss
scoring_elements 0.7846
published_at 2026-04-08T12:55:00Z
5
value 0.01146
scoring_system epss
scoring_elements 0.78464
published_at 2026-04-09T12:55:00Z
6
value 0.01146
scoring_system epss
scoring_elements 0.7849
published_at 2026-04-11T12:55:00Z
7
value 0.01146
scoring_system epss
scoring_elements 0.78471
published_at 2026-04-12T12:55:00Z
8
value 0.01146
scoring_system epss
scoring_elements 0.78463
published_at 2026-04-13T12:55:00Z
9
value 0.01146
scoring_system epss
scoring_elements 0.78492
published_at 2026-04-16T12:55:00Z
10
value 0.01146
scoring_system epss
scoring_elements 0.78491
published_at 2026-04-18T12:55:00Z
11
value 0.01146
scoring_system epss
scoring_elements 0.78487
published_at 2026-04-21T12:55:00Z
12
value 0.01146
scoring_system epss
scoring_elements 0.7852
published_at 2026-04-24T12:55:00Z
13
value 0.01146
scoring_system epss
scoring_elements 0.78528
published_at 2026-04-26T12:55:00Z
14
value 0.01146
scoring_system epss
scoring_elements 0.78543
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1523481
reference_id 1523481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1523481
4
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
5
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
fixed_packages
aliases CVE-2017-15126
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smpk-tkz2-7uc4
26
url VCID-ss2b-ybg2-a3hb
vulnerability_id VCID-ss2b-ybg2-a3hb
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html
11
reference_url http://patchwork.ozlabs.org/patch/746618/
reference_id
reference_type
scores
url http://patchwork.ozlabs.org/patch/746618/
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18017.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18017.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18017
reference_id
reference_type
scores
0
value 0.3431
scoring_system epss
scoring_elements 0.96956
published_at 2026-04-01T12:55:00Z
1
value 0.3431
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-29T12:55:00Z
2
value 0.3431
scoring_system epss
scoring_elements 0.96996
published_at 2026-04-18T12:55:00Z
3
value 0.3431
scoring_system epss
scoring_elements 0.96999
published_at 2026-04-24T12:55:00Z
4
value 0.3431
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-26T12:55:00Z
5
value 0.3431
scoring_system epss
scoring_elements 0.96964
published_at 2026-04-02T12:55:00Z
6
value 0.3431
scoring_system epss
scoring_elements 0.96968
published_at 2026-04-04T12:55:00Z
7
value 0.3431
scoring_system epss
scoring_elements 0.96971
published_at 2026-04-07T12:55:00Z
8
value 0.3431
scoring_system epss
scoring_elements 0.96979
published_at 2026-04-08T12:55:00Z
9
value 0.3431
scoring_system epss
scoring_elements 0.9698
published_at 2026-04-09T12:55:00Z
10
value 0.3431
scoring_system epss
scoring_elements 0.96983
published_at 2026-04-11T12:55:00Z
11
value 0.3431
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-13T12:55:00Z
12
value 0.3431
scoring_system epss
scoring_elements 0.96993
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18017
14
reference_url https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901
50
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
51
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
52
reference_url https://lkml.org/lkml/2017/4/2/13
reference_id
reference_type
scores
url https://lkml.org/lkml/2017/4/2/13
53
reference_url https://security.netapp.com/advisory/ntap-20250103-0010/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20250103-0010/
54
reference_url https://support.f5.com/csp/article/K18352029
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K18352029
55
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34
56
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
57
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36
58
reference_url http://www.securityfocus.com/bid/102367
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102367
59
reference_url http://www.ubuntu.com/usn/USN-3583-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3583-1
60
reference_url http://www.ubuntu.com/usn/USN-3583-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3583-2
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1531135
reference_id 1531135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1531135
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
reference_id cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18017
reference_id CVE-2017-18017
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18017
122
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
123
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
124
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
125
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
126
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
127
reference_url https://access.redhat.com/errata/RHSA-2018:1737
reference_id RHSA-2018:1737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1737
128
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
129
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-18017
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss2b-ybg2-a3hb
27
url VCID-t8dw-trej-hbg7
vulnerability_id VCID-t8dw-trej-hbg7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000410.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000410
reference_id
reference_type
scores
0
value 0.01922
scoring_system epss
scoring_elements 0.83288
published_at 2026-04-01T12:55:00Z
1
value 0.01922
scoring_system epss
scoring_elements 0.83429
published_at 2026-04-29T12:55:00Z
2
value 0.01922
scoring_system epss
scoring_elements 0.83395
published_at 2026-04-16T12:55:00Z
3
value 0.01922
scoring_system epss
scoring_elements 0.83396
published_at 2026-04-18T12:55:00Z
4
value 0.01922
scoring_system epss
scoring_elements 0.83397
published_at 2026-04-21T12:55:00Z
5
value 0.01922
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-24T12:55:00Z
6
value 0.01922
scoring_system epss
scoring_elements 0.83427
published_at 2026-04-26T12:55:00Z
7
value 0.01922
scoring_system epss
scoring_elements 0.83305
published_at 2026-04-02T12:55:00Z
8
value 0.01922
scoring_system epss
scoring_elements 0.83321
published_at 2026-04-07T12:55:00Z
9
value 0.01922
scoring_system epss
scoring_elements 0.83344
published_at 2026-04-08T12:55:00Z
10
value 0.01922
scoring_system epss
scoring_elements 0.83354
published_at 2026-04-09T12:55:00Z
11
value 0.01922
scoring_system epss
scoring_elements 0.83369
published_at 2026-04-11T12:55:00Z
12
value 0.01922
scoring_system epss
scoring_elements 0.83363
published_at 2026-04-12T12:55:00Z
13
value 0.01922
scoring_system epss
scoring_elements 0.83359
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000410
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
23
reference_url http://seclists.org/oss-sec/2017/q4/357
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2017/q4/357
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
26
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
27
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
28
reference_url http://www.securityfocus.com/bid/102101
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102101
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519160
reference_id 1519160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519160
30
reference_url https://security.archlinux.org/AVG-1983
reference_id AVG-1983
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1983
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000410
reference_id CVE-2017-1000410
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000410
54
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
55
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
56
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
57
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
58
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
59
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
60
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
61
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2017-1000410
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8dw-trej-hbg7
28
url VCID-tn1d-x7wx-5bdb
vulnerability_id VCID-tn1d-x7wx-5bdb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24628
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2442
published_at 2026-04-29T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24532
published_at 2026-04-21T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24476
published_at 2026-04-24T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24461
published_at 2026-04-26T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24704
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24743
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24516
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24587
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24634
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.2465
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24607
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24565
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
38
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
39
reference_url https://source.android.com/security/bulletin/pixel/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2017-12-01
40
reference_url https://www.debian.org/security/2018/dsa-4120
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4120
41
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
reference_id 1548412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
reference_id CVE-2017-13166
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
48
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
49
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
50
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2017-13166
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-x7wx-5bdb
29
url VCID-tpwq-tcyt-jbaw
vulnerability_id VCID-tpwq-tcyt-jbaw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17449.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17449
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2279
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22641
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22942
published_at 2026-04-11T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22905
published_at 2026-04-12T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22848
published_at 2026-04-13T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22862
published_at 2026-04-16T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22856
published_at 2026-04-18T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-21T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22653
published_at 2026-04-24T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22646
published_at 2026-04-26T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.2296
published_at 2026-04-02T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.23003
published_at 2026-04-04T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-07T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22869
published_at 2026-04-08T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22922
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17449
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://lkml.org/lkml/2017/12/5/950
reference_id
reference_type
scores
url https://lkml.org/lkml/2017/12/5/950
25
reference_url https://source.android.com/security/bulletin/pixel/2018-04-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2018-04-01
26
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
27
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
28
reference_url http://www.securityfocus.com/bid/102122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102122
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525762
reference_id 1525762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525762
30
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
31
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
32
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
33
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
34
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
35
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
36
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
37
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17449
reference_id CVE-2017-17449
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17449
40
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
41
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
42
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
43
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
44
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
45
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
46
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
47
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
48
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
49
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
50
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
51
reference_url https://usn.ubuntu.com/3657-1/
reference_id USN-3657-1
reference_type
scores
url https://usn.ubuntu.com/3657-1/
fixed_packages
aliases CVE-2017-17449
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpwq-tcyt-jbaw
30
url VCID-uhaa-kaea-zuf4
vulnerability_id VCID-uhaa-kaea-zuf4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5750.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5750
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11131
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11195
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11017
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11097
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11151
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11155
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11122
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.111
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10965
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10979
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11116
published_at 2026-04-21T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11061
published_at 2026-04-24T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.11015
published_at 2026-04-26T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539706
reference_id 1539706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539706
38
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
39
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
40
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
41
reference_url https://usn.ubuntu.com/3631-1/
reference_id USN-3631-1
reference_type
scores
url https://usn.ubuntu.com/3631-1/
42
reference_url https://usn.ubuntu.com/3631-2/
reference_id USN-3631-2
reference_type
scores
url https://usn.ubuntu.com/3631-2/
43
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
44
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
45
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
46
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-5750
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhaa-kaea-zuf4
31
url VCID-v8fp-rzfq-e3bs
vulnerability_id VCID-v8fp-rzfq-e3bs
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
reference_id
reference_type
scores
0
value 0.88597
scoring_system epss
scoring_elements 0.995
published_at 2026-04-02T12:55:00Z
1
value 0.88597
scoring_system epss
scoring_elements 0.99501
published_at 2026-04-04T12:55:00Z
2
value 0.89042
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-26T12:55:00Z
3
value 0.89094
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-18T12:55:00Z
4
value 0.89094
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-16T12:55:00Z
5
value 0.89094
scoring_system epss
scoring_elements 0.9953
published_at 2026-04-13T12:55:00Z
6
value 0.89094
scoring_system epss
scoring_elements 0.99529
published_at 2026-04-09T12:55:00Z
7
value 0.89147
scoring_system epss
scoring_elements 0.99538
published_at 2026-04-24T12:55:00Z
8
value 0.89198
scoring_system epss
scoring_elements 0.99542
published_at 2026-04-29T12:55:00Z
9
value 0.89198
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-07T12:55:00Z
10
value 0.89198
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-08T12:55:00Z
11
value 0.89198
scoring_system epss
scoring_elements 0.99539
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
61
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:N/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
62
reference_url http://www.securityfocus.com/bid/102376
reference_id 102376
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securityfocus.com/bid/102376
63
reference_url http://www.securitytracker.com/id/1040071
reference_id 1040071
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securitytracker.com/id/1040071
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
reference_id 1519780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
65
reference_url https://www.kb.cert.org/vuls/id/180049
reference_id 180049
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.kb.cert.org/vuls/id/180049
66
reference_url https://seclists.org/bugtraq/2019/Jun/36
reference_id 36
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://seclists.org/bugtraq/2019/Jun/36
67
reference_url https://www.exploit-db.com/exploits/43427/
reference_id 43427
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.exploit-db.com/exploits/43427/
68
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
reference_id 4609
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
69
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
reference_id 4611
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
70
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
reference_id 4613
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
71
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
reference_id 4614
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
72
reference_url http://www.kb.cert.org/vuls/id/584653
reference_id 584653
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.kb.cert.org/vuls/id/584653
73
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
reference_id 886532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
74
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
75
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
reference_id ADV180002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
76
reference_url http://xenbits.xen.org/xsa/advisory-254.html
reference_id advisory-254.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://xenbits.xen.org/xsa/advisory-254.html
77
reference_url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_id advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
78
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
reference_id ARUBA-PSA-2018-001.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
79
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
reference_id ARUBA-PSA-2019-003.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
80
reference_url https://security.archlinux.org/ASA-201801-10
reference_id ASA-201801-10
reference_type
scores
url https://security.archlinux.org/ASA-201801-10
81
reference_url https://security.archlinux.org/AVG-557
reference_id AVG-557
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-557
82
reference_url https://security.archlinux.org/AVG-558
reference_id AVG-558
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-558
83
reference_url https://security.archlinux.org/AVG-559
reference_id AVG-559
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-559
84
reference_url https://security.archlinux.org/AVG-582
reference_id AVG-582
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-582
85
reference_url https://security.archlinux.org/AVG-583
reference_id AVG-583
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-583
86
reference_url https://security.archlinux.org/AVG-987
reference_id AVG-987
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-987
87
reference_url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
reference_id AWS-2018-013
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
88
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
reference_id cisco-sa-20180104-cpusidechannel
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
89
reference_url https://support.citrix.com/article/CTX231399
reference_id CTX231399
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.citrix.com/article/CTX231399
90
reference_url https://security.paloaltonetworks.com/CVE-2017-5715
reference_id CVE-2017-5715
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.paloaltonetworks.com/CVE-2017-5715
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
92
reference_url https://spectreattack.com/spectre.pdf
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://spectreattack.com/spectre.pdf
93
reference_url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
reference_id display?docId=emr_na-hpesbhf03805en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
94
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
95
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
reference_id FreeBSD-SA-18:03.speculative_execution.asc
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
96
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
97
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.gentoo.org/glsa/201810-06
98
reference_url https://support.f5.com/csp/article/K91229003
reference_id K91229003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.f5.com/csp/article/K91229003
99
reference_url https://support.lenovo.com/us/en/solutions/LEN-18282
reference_id LEN-18282
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.lenovo.com/us/en/solutions/LEN-18282
100
reference_url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
reference_id mitel-product-security-advisory-18-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
101
reference_url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
reference_id mitigations-landing-new-class-timing-attack
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
102
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
103
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
104
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
105
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
106
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
107
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
108
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
109
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
110
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
111
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
112
reference_url https://security.netapp.com/advisory/ntap-20180104-0001/
reference_id ntap-20180104-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.netapp.com/advisory/ntap-20180104-0001/
113
reference_url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
reference_id reading-privileged-memory-with-side.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
114
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
115
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
116
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
117
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
118
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
119
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
120
reference_url https://access.redhat.com/errata/RHSA-2018:0023
reference_id RHSA-2018:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0023
121
reference_url https://access.redhat.com/errata/RHSA-2018:0027
reference_id RHSA-2018:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0027
122
reference_url https://access.redhat.com/errata/RHSA-2018:0028
reference_id RHSA-2018:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0028
123
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/errata/RHSA-2018:0292
124
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
125
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
126
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
127
reference_url https://access.redhat.com/errata/RHSA-2018:1196
reference_id RHSA-2018:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1196
128
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
129
reference_url https://access.redhat.com/errata/RHSA-2018:1252
reference_id RHSA-2018:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1252
130
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
131
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
132
reference_url https://access.redhat.com/errata/RHSA-2018:1967
reference_id RHSA-2018:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1967
133
reference_url https://spectreattack.com/
reference_id spectreattack.com
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://spectreattack.com/
134
reference_url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_id Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
135
reference_url https://access.redhat.com/security/vulnerabilities/speculativeexecution
reference_id speculativeexecution
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/security/vulnerabilities/speculativeexecution
136
reference_url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
reference_id speculative-processor-vulnerability
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
137
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
reference_id ssa-608355.pdf
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
138
reference_url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
reference_id suse-addresses-meltdown-spectre-vulnerabilities
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
139
reference_url https://www.synology.com/support/security/Synology_SA_18_01
reference_id Synology_SA_18_01
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.synology.com/support/security/Synology_SA_18_01
140
reference_url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
reference_id todays-cpu-vulnerability-what-you-need.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
141
reference_url https://usn.ubuntu.com/usn/usn-3516-1/
reference_id usn-3516-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/usn/usn-3516-1/
142
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
143
reference_url https://usn.ubuntu.com/3530-1/
reference_id USN-3530-1
reference_type
scores
url https://usn.ubuntu.com/3530-1/
144
reference_url https://usn.ubuntu.com/3531-1/
reference_id USN-3531-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-1/
145
reference_url https://usn.ubuntu.com/3531-3/
reference_id USN-3531-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-3/
146
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
147
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3540-2/
148
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
149
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3541-2/
150
reference_url https://usn.ubuntu.com/3542-1/
reference_id USN-3542-1
reference_type
scores
url https://usn.ubuntu.com/3542-1/
151
reference_url https://usn.ubuntu.com/3542-2/
reference_id USN-3542-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3542-2/
152
reference_url https://usn.ubuntu.com/3549-1/
reference_id USN-3549-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3549-1/
153
reference_url https://usn.ubuntu.com/3560-1/
reference_id USN-3560-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3560-1/
154
reference_url https://usn.ubuntu.com/3561-1/
reference_id USN-3561-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3561-1/
155
reference_url https://usn.ubuntu.com/3580-1/
reference_id USN-3580-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3580-1/
156
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-1/
157
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-2/
158
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-1/
159
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-2/
160
reference_url https://usn.ubuntu.com/3594-1/
reference_id USN-3594-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3594-1/
161
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-1/
162
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-2/
163
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3620-2/
164
reference_url https://usn.ubuntu.com/3690-1/
reference_id USN-3690-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3690-1/
165
reference_url https://usn.ubuntu.com/3777-3/
reference_id USN-3777-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3777-3/
166
reference_url https://cert.vde.com/en-us/advisories/vde-2018-002
reference_id vde-2018-002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-002
167
reference_url https://cert.vde.com/en-us/advisories/vde-2018-003
reference_id vde-2018-003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-003
168
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
reference_id VMSA-2018-0002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
169
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
reference_id VMSA-2018-0004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
170
reference_url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
reference_id VMSA-2018-0007.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
171
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
aliases CVE-2017-5715
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs
32
url VCID-z1mm-6278-8fg4
vulnerability_id VCID-z1mm-6278-8fg4
summary kernel: Use-after-free in snd_seq_ioctl_create_port()
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
1
reference_url http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
reference_id
reference_type
scores
url http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15265.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15265.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15265
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28677
published_at 2026-04-12T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28273
published_at 2026-04-29T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28717
published_at 2026-04-09T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28721
published_at 2026-04-11T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28629
published_at 2026-04-13T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28649
published_at 2026-04-16T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28624
published_at 2026-04-18T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28575
published_at 2026-04-21T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28461
published_at 2026-04-24T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28349
published_at 2026-04-26T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28759
published_at 2026-04-02T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28806
published_at 2026-04-04T12:55:00Z
12
value 0.00106
scoring_system epss
scoring_elements 0.28613
published_at 2026-04-07T12:55:00Z
13
value 0.00106
scoring_system epss
scoring_elements 0.28678
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15265
4
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1062520
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1062520
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
8
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
9
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
10
reference_url https://source.android.com/security/bulletin/2018-02-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2018-02-01
11
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
12
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
13
reference_url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
14
reference_url http://www.openwall.com/lists/oss-security/2017/10/11/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/11/3
15
reference_url http://www.securityfocus.com/bid/101288
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101288
16
reference_url http://www.securitytracker.com/id/1039561
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039561
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501878
reference_id 1501878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501878
18
reference_url https://security.archlinux.org/AVG-508
reference_id AVG-508
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-508
19
reference_url https://security.archlinux.org/AVG-509
reference_id AVG-509
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-509
20
reference_url https://security.archlinux.org/AVG-510
reference_id AVG-510
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-510
21
reference_url https://security.archlinux.org/AVG-511
reference_id AVG-511
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-511
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15265
reference_id CVE-2017-15265
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15265
24
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
25
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
26
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
27
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
28
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
29
reference_url https://access.redhat.com/errata/RHSA-2018:3822
reference_id RHSA-2018:3822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3822
30
reference_url https://access.redhat.com/errata/RHSA-2018:3823
reference_id RHSA-2018:3823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3823
31
reference_url https://usn.ubuntu.com/3485-1/
reference_id USN-3485-1
reference_type
scores
url https://usn.ubuntu.com/3485-1/
32
reference_url https://usn.ubuntu.com/3485-2/
reference_id USN-3485-2
reference_type
scores
url https://usn.ubuntu.com/3485-2/
33
reference_url https://usn.ubuntu.com/3485-3/
reference_id USN-3485-3
reference_type
scores
url https://usn.ubuntu.com/3485-3/
34
reference_url https://usn.ubuntu.com/3487-1/
reference_id USN-3487-1
reference_type
scores
url https://usn.ubuntu.com/3487-1/
35
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
36
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2017-15265
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1mm-6278-8fg4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-862%3Farch=el7