Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@1:3.10.0-693.25.2.rt56.612?arch=el6rt
Typerpm
Namespaceredhat
Namekernel-rt
Version1:3.10.0-693.25.2.rt56.612
Qualifiers
arch el6rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6yd5-dczd-83f4
vulnerability_id VCID-6yd5-dczd-83f4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
1
reference_url http://lists.openwall.net/netdev/2017/12/04/224
reference_id
reference_type
scores
url http://lists.openwall.net/netdev/2017/12/04/224
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8824.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8824.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8824
reference_id
reference_type
scores
0
value 0.00851
scoring_system epss
scoring_elements 0.74849
published_at 2026-04-01T12:55:00Z
1
value 0.00851
scoring_system epss
scoring_elements 0.74971
published_at 2026-04-29T12:55:00Z
2
value 0.00851
scoring_system epss
scoring_elements 0.74922
published_at 2026-04-11T12:55:00Z
3
value 0.00851
scoring_system epss
scoring_elements 0.749
published_at 2026-04-12T12:55:00Z
4
value 0.00851
scoring_system epss
scoring_elements 0.7489
published_at 2026-04-13T12:55:00Z
5
value 0.00851
scoring_system epss
scoring_elements 0.74927
published_at 2026-04-16T12:55:00Z
6
value 0.00851
scoring_system epss
scoring_elements 0.74934
published_at 2026-04-18T12:55:00Z
7
value 0.00851
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-21T12:55:00Z
8
value 0.00851
scoring_system epss
scoring_elements 0.74962
published_at 2026-04-24T12:55:00Z
9
value 0.00851
scoring_system epss
scoring_elements 0.74967
published_at 2026-04-26T12:55:00Z
10
value 0.00851
scoring_system epss
scoring_elements 0.7485
published_at 2026-04-02T12:55:00Z
11
value 0.00851
scoring_system epss
scoring_elements 0.74879
published_at 2026-04-04T12:55:00Z
12
value 0.00851
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-07T12:55:00Z
13
value 0.00851
scoring_system epss
scoring_elements 0.74885
published_at 2026-04-08T12:55:00Z
14
value 0.00851
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
27
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
28
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
29
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
30
reference_url https://www.exploit-db.com/exploits/43234/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43234/
31
reference_url http://www.securityfocus.com/bid/102056
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102056
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519591
reference_id 1519591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519591
33
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
34
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
35
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
36
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
37
reference_url https://security.archlinux.org/AVG-566
reference_id AVG-566
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-566
38
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
39
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43234.c
reference_id CVE-2017-8824
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43234.c
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8824
reference_id CVE-2017-8824
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8824
43
reference_url http://www.openwall.com/lists/oss-security/2017/12/05/1
reference_id CVE-2017-8824
reference_type exploit
scores
url http://www.openwall.com/lists/oss-security/2017/12/05/1
44
reference_url https://access.redhat.com/errata/RHSA-2018:0399
reference_id RHSA-2018:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0399
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
48
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
49
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
50
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
51
reference_url https://access.redhat.com/errata/RHSA-2018:3822
reference_id RHSA-2018:3822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3822
52
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
url https://usn.ubuntu.com/3581-1/
53
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
url https://usn.ubuntu.com/3581-2/
54
reference_url https://usn.ubuntu.com/3581-3/
reference_id USN-3581-3
reference_type
scores
url https://usn.ubuntu.com/3581-3/
55
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
url https://usn.ubuntu.com/3582-1/
56
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
url https://usn.ubuntu.com/3582-2/
57
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
58
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-8824
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yd5-dczd-83f4
1
url VCID-q688-4s7w-tbg8
vulnerability_id VCID-q688-4s7w-tbg8
summary kernel: Incorrect type conversion for size during dma allocation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9725.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9725
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39849
published_at 2026-04-29T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40196
published_at 2026-04-18T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-21T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-24T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.39929
published_at 2026-04-26T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40209
published_at 2026-04-08T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40234
published_at 2026-04-04T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40156
published_at 2026-04-07T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40195
published_at 2026-04-12T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40176
published_at 2026-04-13T12:55:00Z
13
value 0.00184
scoring_system epss
scoring_elements 0.40226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/2017-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-09-01
5
reference_url http://www.securityfocus.com/bid/100658
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100658
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1489088
reference_id 1489088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1489088
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-9725
reference_id CVE-2017-9725
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-9725
9
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
10
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
11
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
12
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
fixed_packages
aliases CVE-2017-9725
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q688-4s7w-tbg8
2
url VCID-ss2b-ybg2-a3hb
vulnerability_id VCID-ss2b-ybg2-a3hb
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html
11
reference_url http://patchwork.ozlabs.org/patch/746618/
reference_id
reference_type
scores
url http://patchwork.ozlabs.org/patch/746618/
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18017.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18017.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18017
reference_id
reference_type
scores
0
value 0.3431
scoring_system epss
scoring_elements 0.96956
published_at 2026-04-01T12:55:00Z
1
value 0.3431
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-29T12:55:00Z
2
value 0.3431
scoring_system epss
scoring_elements 0.96996
published_at 2026-04-18T12:55:00Z
3
value 0.3431
scoring_system epss
scoring_elements 0.96999
published_at 2026-04-24T12:55:00Z
4
value 0.3431
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-26T12:55:00Z
5
value 0.3431
scoring_system epss
scoring_elements 0.96964
published_at 2026-04-02T12:55:00Z
6
value 0.3431
scoring_system epss
scoring_elements 0.96968
published_at 2026-04-04T12:55:00Z
7
value 0.3431
scoring_system epss
scoring_elements 0.96971
published_at 2026-04-07T12:55:00Z
8
value 0.3431
scoring_system epss
scoring_elements 0.96979
published_at 2026-04-08T12:55:00Z
9
value 0.3431
scoring_system epss
scoring_elements 0.9698
published_at 2026-04-09T12:55:00Z
10
value 0.3431
scoring_system epss
scoring_elements 0.96983
published_at 2026-04-11T12:55:00Z
11
value 0.3431
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-13T12:55:00Z
12
value 0.3431
scoring_system epss
scoring_elements 0.96993
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18017
14
reference_url https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901
50
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
51
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
52
reference_url https://lkml.org/lkml/2017/4/2/13
reference_id
reference_type
scores
url https://lkml.org/lkml/2017/4/2/13
53
reference_url https://security.netapp.com/advisory/ntap-20250103-0010/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20250103-0010/
54
reference_url https://support.f5.com/csp/article/K18352029
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K18352029
55
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34
56
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
57
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36
58
reference_url http://www.securityfocus.com/bid/102367
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102367
59
reference_url http://www.ubuntu.com/usn/USN-3583-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3583-1
60
reference_url http://www.ubuntu.com/usn/USN-3583-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3583-2
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1531135
reference_id 1531135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1531135
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:caas_platform:*:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
reference_id cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:4.20.1fx-virtual-router:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp3:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp4:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:-:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp3:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp2:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp3:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:sap:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp2:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp3:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18017
reference_id CVE-2017-18017
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18017
122
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
123
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
124
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
125
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
126
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
127
reference_url https://access.redhat.com/errata/RHSA-2018:1737
reference_id RHSA-2018:1737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1737
128
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
129
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
fixed_packages
aliases CVE-2017-18017
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss2b-ybg2-a3hb
3
url VCID-t8dw-trej-hbg7
vulnerability_id VCID-t8dw-trej-hbg7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000410.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000410
reference_id
reference_type
scores
0
value 0.01922
scoring_system epss
scoring_elements 0.83288
published_at 2026-04-01T12:55:00Z
1
value 0.01922
scoring_system epss
scoring_elements 0.83429
published_at 2026-04-29T12:55:00Z
2
value 0.01922
scoring_system epss
scoring_elements 0.83395
published_at 2026-04-16T12:55:00Z
3
value 0.01922
scoring_system epss
scoring_elements 0.83396
published_at 2026-04-18T12:55:00Z
4
value 0.01922
scoring_system epss
scoring_elements 0.83397
published_at 2026-04-21T12:55:00Z
5
value 0.01922
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-24T12:55:00Z
6
value 0.01922
scoring_system epss
scoring_elements 0.83427
published_at 2026-04-26T12:55:00Z
7
value 0.01922
scoring_system epss
scoring_elements 0.83305
published_at 2026-04-02T12:55:00Z
8
value 0.01922
scoring_system epss
scoring_elements 0.83321
published_at 2026-04-07T12:55:00Z
9
value 0.01922
scoring_system epss
scoring_elements 0.83344
published_at 2026-04-08T12:55:00Z
10
value 0.01922
scoring_system epss
scoring_elements 0.83354
published_at 2026-04-09T12:55:00Z
11
value 0.01922
scoring_system epss
scoring_elements 0.83369
published_at 2026-04-11T12:55:00Z
12
value 0.01922
scoring_system epss
scoring_elements 0.83363
published_at 2026-04-12T12:55:00Z
13
value 0.01922
scoring_system epss
scoring_elements 0.83359
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000410
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
23
reference_url http://seclists.org/oss-sec/2017/q4/357
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2017/q4/357
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
26
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
27
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
28
reference_url http://www.securityfocus.com/bid/102101
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102101
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519160
reference_id 1519160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519160
30
reference_url https://security.archlinux.org/AVG-1983
reference_id AVG-1983
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1983
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000410
reference_id CVE-2017-1000410
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000410
54
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
55
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
56
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
57
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
58
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
59
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
60
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
61
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2017-1000410
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8dw-trej-hbg7
4
url VCID-tn1d-x7wx-5bdb
vulnerability_id VCID-tn1d-x7wx-5bdb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24628
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2442
published_at 2026-04-29T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24532
published_at 2026-04-21T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24476
published_at 2026-04-24T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24461
published_at 2026-04-26T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24704
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24743
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24516
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24587
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24634
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.2465
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24607
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24565
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
38
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
39
reference_url https://source.android.com/security/bulletin/pixel/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2017-12-01
40
reference_url https://www.debian.org/security/2018/dsa-4120
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4120
41
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
reference_id 1548412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
reference_id CVE-2017-13166
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
48
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
49
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
50
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2017-13166
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-x7wx-5bdb
5
url VCID-tpwq-tcyt-jbaw
vulnerability_id VCID-tpwq-tcyt-jbaw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17449.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17449
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2279
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22641
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22942
published_at 2026-04-11T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22905
published_at 2026-04-12T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22848
published_at 2026-04-13T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22862
published_at 2026-04-16T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22856
published_at 2026-04-18T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-21T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22653
published_at 2026-04-24T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22646
published_at 2026-04-26T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.2296
published_at 2026-04-02T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.23003
published_at 2026-04-04T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-07T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22869
published_at 2026-04-08T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22922
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17449
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://lkml.org/lkml/2017/12/5/950
reference_id
reference_type
scores
url https://lkml.org/lkml/2017/12/5/950
25
reference_url https://source.android.com/security/bulletin/pixel/2018-04-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2018-04-01
26
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
27
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
28
reference_url http://www.securityfocus.com/bid/102122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102122
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525762
reference_id 1525762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525762
30
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
31
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
32
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
33
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
34
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
35
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
36
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
37
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17449
reference_id CVE-2017-17449
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17449
40
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
41
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
42
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
43
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
44
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
45
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
46
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
47
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
48
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
49
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
50
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
51
reference_url https://usn.ubuntu.com/3657-1/
reference_id USN-3657-1
reference_type
scores
url https://usn.ubuntu.com/3657-1/
fixed_packages
aliases CVE-2017-17449
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpwq-tcyt-jbaw
6
url VCID-z1mm-6278-8fg4
vulnerability_id VCID-z1mm-6278-8fg4
summary kernel: Use-after-free in snd_seq_ioctl_create_port()
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
1
reference_url http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
reference_id
reference_type
scores
url http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15265.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15265.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15265
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28677
published_at 2026-04-12T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28273
published_at 2026-04-29T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28717
published_at 2026-04-09T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28721
published_at 2026-04-11T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28629
published_at 2026-04-13T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28649
published_at 2026-04-16T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28624
published_at 2026-04-18T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28575
published_at 2026-04-21T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28461
published_at 2026-04-24T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28349
published_at 2026-04-26T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28759
published_at 2026-04-02T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28806
published_at 2026-04-04T12:55:00Z
12
value 0.00106
scoring_system epss
scoring_elements 0.28613
published_at 2026-04-07T12:55:00Z
13
value 0.00106
scoring_system epss
scoring_elements 0.28678
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15265
4
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1062520
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1062520
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
8
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
9
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
10
reference_url https://source.android.com/security/bulletin/2018-02-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2018-02-01
11
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
12
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
13
reference_url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
14
reference_url http://www.openwall.com/lists/oss-security/2017/10/11/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/10/11/3
15
reference_url http://www.securityfocus.com/bid/101288
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101288
16
reference_url http://www.securitytracker.com/id/1039561
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039561
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501878
reference_id 1501878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501878
18
reference_url https://security.archlinux.org/AVG-508
reference_id AVG-508
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-508
19
reference_url https://security.archlinux.org/AVG-509
reference_id AVG-509
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-509
20
reference_url https://security.archlinux.org/AVG-510
reference_id AVG-510
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-510
21
reference_url https://security.archlinux.org/AVG-511
reference_id AVG-511
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-511
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15265
reference_id CVE-2017-15265
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15265
24
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
25
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
26
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
27
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
28
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
29
reference_url https://access.redhat.com/errata/RHSA-2018:3822
reference_id RHSA-2018:3822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3822
30
reference_url https://access.redhat.com/errata/RHSA-2018:3823
reference_id RHSA-2018:3823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3823
31
reference_url https://usn.ubuntu.com/3485-1/
reference_id USN-3485-1
reference_type
scores
url https://usn.ubuntu.com/3485-1/
32
reference_url https://usn.ubuntu.com/3485-2/
reference_id USN-3485-2
reference_type
scores
url https://usn.ubuntu.com/3485-2/
33
reference_url https://usn.ubuntu.com/3485-3/
reference_id USN-3485-3
reference_type
scores
url https://usn.ubuntu.com/3485-3/
34
reference_url https://usn.ubuntu.com/3487-1/
reference_id USN-3487-1
reference_type
scores
url https://usn.ubuntu.com/3487-1/
35
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
36
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2017-15265
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1mm-6278-8fg4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@1:3.10.0-693.25.2.rt56.612%3Farch=el6rt