{"url":"http://public2.vulnerablecode.io/api/packages/111655?format=json","purl":"pkg:rpm/redhat/kernel-rt@1:3.10.0-693.2.1.rt56.585?arch=el6rt","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"1:3.10.0-693.2.1.rt56.585","qualifiers":{"arch":"el6rt"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85117?format=json","vulnerability_id":"VCID-25tv-dd91-wffh","summary":"kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7097","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16424","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1368938","reference_id":"1368938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1368938"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0817","reference_id":"RHSA-2017:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3146-1/","reference_id":"USN-3146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3146-1/"},{"reference_url":"https://usn.ubuntu.com/3146-2/","reference_id":"USN-3146-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3146-2/"},{"reference_url":"https://usn.ubuntu.com/3147-1/","reference_id":"USN-3147-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3147-1/"},{"reference_url":"https://usn.ubuntu.com/3161-3/","reference_id":"USN-3161-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-3/"},{"reference_url":"https://usn.ubuntu.com/3161-4/","reference_id":"USN-3161-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-4/"},{"reference_url":"https://usn.ubuntu.com/3162-2/","reference_id":"USN-3162-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3162-2/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2016-7097"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25tv-dd91-wffh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84362?format=json","vulnerability_id":"VCID-2nwr-4qy5-j7a5","summary":"kernel: ext4: power failure during write(2) causes on-disk information leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7495","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16208","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16049","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16088","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15978","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15938","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450261","reference_id":"1450261","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3405-1/","reference_id":"USN-3405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3405-1/"},{"reference_url":"https://usn.ubuntu.com/3405-2/","reference_id":"USN-3405-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3405-2/"},{"reference_url":"https://usn.ubuntu.com/3406-1/","reference_id":"USN-3406-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3406-1/"},{"reference_url":"https://usn.ubuntu.com/3406-2/","reference_id":"USN-3406-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3406-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7495"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nwr-4qy5-j7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82840?format=json","vulnerability_id":"VCID-49zh-3frn-pybg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9076","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452688","reference_id":"1452688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9076"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49zh-3frn-pybg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82842?format=json","vulnerability_id":"VCID-4brq-uc34-uyb1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9077","reference_id":"","reference_type":"","scores":[{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.7551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75576","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76524","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76502","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452744","reference_id":"1452744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9077"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4brq-uc34-uyb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63408?format=json","vulnerability_id":"VCID-5f6p-fkh4-jkf5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7533.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7533","reference_id":"","reference_type":"","scores":[{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92767","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92779","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.9279","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09416","scoring_system":"epss","scoring_elements":"0.92809","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1468283","reference_id":"1468283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1468283"},{"reference_url":"https://github.com/hardenedlinux/offensive_poc/blob/4a71e00b07be66606a7cc7c9b1f2213e89188ab7/CVE-2017-7533/exploit.c","reference_id":"CVE-2017-7533","reference_type":"exploit","scores":[],"url":"https://github.com/hardenedlinux/offensive_poc/blob/4a71e00b07be66606a7cc7c9b1f2213e89188ab7/CVE-2017-7533/exploit.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/44302.c","reference_id":"CVE-2017-7533","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/44302.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2473","reference_id":"RHSA-2017:2473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2585","reference_id":"RHSA-2017:2585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2770","reference_id":"RHSA-2017:2770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2869","reference_id":"RHSA-2017:2869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2869"},{"reference_url":"https://usn.ubuntu.com/3377-1/","reference_id":"USN-3377-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3377-1/"},{"reference_url":"https://usn.ubuntu.com/3377-2/","reference_id":"USN-3377-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3377-2/"},{"reference_url":"https://usn.ubuntu.com/3378-1/","reference_id":"USN-3378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3378-1/"},{"reference_url":"https://usn.ubuntu.com/3378-2/","reference_id":"USN-3378-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3378-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7533"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5f6p-fkh4-jkf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82193?format=json","vulnerability_id":"VCID-5r82-gqnd-9yac","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5970","reference_id":"","reference_type":"","scores":[{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82511","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01752","scoring_system":"epss","scoring_elements":"0.8264","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421638","reference_id":"1421638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3265-1/","reference_id":"USN-3265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3265-1/"},{"reference_url":"https://usn.ubuntu.com/3265-2/","reference_id":"USN-3265-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3265-2/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2017-5970"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5r82-gqnd-9yac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85276?format=json","vulnerability_id":"VCID-63qx-mgsw-qkf1","summary":"kernel: ext4 filesystem page fault race condition with fallocate call.","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8839","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12907","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13043","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12926","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13023","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/04/01/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/04/01/4"},{"reference_url":"http://www.securityfocus.com/bid/85798","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85798"},{"reference_url":"http://www.securitytracker.com/id/1035455","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035455"},{"reference_url":"http://www.ubuntu.com/usn/USN-3005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3005-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3006-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3006-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3007-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3007-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323577","reference_id":"1323577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8839","reference_id":"CVE-2015-8839","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3005-1/","reference_id":"USN-3005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3005-1/"},{"reference_url":"https://usn.ubuntu.com/3006-1/","reference_id":"USN-3006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3006-1/"},{"reference_url":"https://usn.ubuntu.com/3007-1/","reference_id":"USN-3007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3007-1/"}],"fixed_packages":[],"aliases":["CVE-2015-8839"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63qx-mgsw-qkf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63411?format=json","vulnerability_id":"VCID-8pqu-nssu-7qav","summary":"security update","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7889","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08853","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6"},{"reference_url":"http://www.debian.org/security/2017/dsa-3945","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3945"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/04/16/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/04/16/4"},{"reference_url":"http://www.securityfocus.com/bid/97690","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444493","reference_id":"1444493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444493"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7889","reference_id":"CVE-2017-7889","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3314-1/","reference_id":"USN-3314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3314-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3583-1/","reference_id":"USN-3583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-1/"},{"reference_url":"https://usn.ubuntu.com/3583-2/","reference_id":"USN-3583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7889"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pqu-nssu-7qav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84518?format=json","vulnerability_id":"VCID-ad4y-dkpp-hyf3","summary":"kernel: scsi: Stack-based buffer overflow in sg_ioctl function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7187","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12037","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12089","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b","reference_id":"","reference_type":"","scores":[],"url":"https://gist.github.com/dvyukov/48ad14e84de45b0be92b7f0eda20ff1b"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.11/scsi-fixes&id=bf33f87dd04c371ea33feb821b60d63d754e3124"},{"reference_url":"https://source.android.com/security/bulletin/pixel/2017-10-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/pixel/2017-10-01"},{"reference_url":"http://www.securityfocus.com/bid/96989","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96989"},{"reference_url":"http://www.securitytracker.com/id/1038086","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038086"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434327","reference_id":"1434327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434327"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7187","reference_id":"CVE-2017-7187","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3291-1/","reference_id":"USN-3291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-1/"},{"reference_url":"https://usn.ubuntu.com/3291-2/","reference_id":"USN-3291-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-2/"},{"reference_url":"https://usn.ubuntu.com/3291-3/","reference_id":"USN-3291-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-3/"},{"reference_url":"https://usn.ubuntu.com/3293-1/","reference_id":"USN-3293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3293-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7187"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ad4y-dkpp-hyf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81228?format=json","vulnerability_id":"VCID-ee2v-v111-mbeb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7042","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26824","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26718","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26728","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26671","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26476","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373966","reference_id":"1373966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0817","reference_id":"RHSA-2017:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3126-1/","reference_id":"USN-3126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3126-1/"},{"reference_url":"https://usn.ubuntu.com/3126-2/","reference_id":"USN-3126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3126-2/"},{"reference_url":"https://usn.ubuntu.com/3127-1/","reference_id":"USN-3127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3127-1/"},{"reference_url":"https://usn.ubuntu.com/3127-2/","reference_id":"USN-3127-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3127-2/"},{"reference_url":"https://usn.ubuntu.com/3128-1/","reference_id":"USN-3128-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3128-1/"},{"reference_url":"https://usn.ubuntu.com/3128-2/","reference_id":"USN-3128-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3128-2/"},{"reference_url":"https://usn.ubuntu.com/3128-3/","reference_id":"USN-3128-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3128-3/"},{"reference_url":"https://usn.ubuntu.com/3129-1/","reference_id":"USN-3129-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3129-1/"},{"reference_url":"https://usn.ubuntu.com/3129-2/","reference_id":"USN-3129-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3129-2/"},{"reference_url":"https://usn.ubuntu.com/3161-3/","reference_id":"USN-3161-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-3/"}],"fixed_packages":[],"aliases":["CVE-2016-7042"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ee2v-v111-mbeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84786?format=json","vulnerability_id":"VCID-egg4-ayg5-3yaj","summary":"kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10741","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20398","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20752","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2047","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20625","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20516","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20515","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10741"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1124010","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1124010"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"reference_url":"http://www.securityfocus.com/bid/106822","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106822"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671869","reference_id":"1671869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671869"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10741","reference_id":"CVE-2016-10741","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"}],"fixed_packages":[],"aliases":["CVE-2016-10741"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egg4-ayg5-3yaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82191?format=json","vulnerability_id":"VCID-em45-cam8-tkcn","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5551","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19929","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19909","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:N"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416126","reference_id":"1416126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0817","reference_id":"RHSA-2017:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3234-1/","reference_id":"USN-3234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3234-1/"},{"reference_url":"https://usn.ubuntu.com/3234-2/","reference_id":"USN-3234-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3234-2/"},{"reference_url":"https://usn.ubuntu.com/3359-1/","reference_id":"USN-3359-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3359-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"}],"fixed_packages":[],"aliases":["CVE-2017-5551"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-em45-cam8-tkcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84653?format=json","vulnerability_id":"VCID-espt-gh1j-q3ed","summary":"kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10088","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22605","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22452","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22718","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22657","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412210","reference_id":"1412210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412210"},{"reference_url":"https://security.archlinux.org/ASA-201702-17","reference_id":"ASA-201702-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-17"},{"reference_url":"https://security.archlinux.org/ASA-201702-18","reference_id":"ASA-201702-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-18"},{"reference_url":"https://security.archlinux.org/AVG-178","reference_id":"AVG-178","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-178"},{"reference_url":"https://security.archlinux.org/AVG-186","reference_id":"AVG-186","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-186"},{"reference_url":"https://security.archlinux.org/AVG-190","reference_id":"AVG-190","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0817","reference_id":"RHSA-2017:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3208-1/","reference_id":"USN-3208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3208-1/"},{"reference_url":"https://usn.ubuntu.com/3208-2/","reference_id":"USN-3208-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3208-2/"},{"reference_url":"https://usn.ubuntu.com/3209-1/","reference_id":"USN-3209-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3209-1/"},{"reference_url":"https://usn.ubuntu.com/3360-1/","reference_id":"USN-3360-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3360-1/"},{"reference_url":"https://usn.ubuntu.com/3360-2/","reference_id":"USN-3360-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3360-2/"}],"fixed_packages":[],"aliases":["CVE-2016-10088"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-espt-gh1j-q3ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84538?format=json","vulnerability_id":"VCID-jsc3-j8v3-x7fy","summary":"kernel: NULL pointer dereference in keyring_search_aux function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6951","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25778","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/96943","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96943"},{"reference_url":"http://www.spinics.net/lists/keyrings/msg01845.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/keyrings/msg01845.html"},{"reference_url":"http://www.spinics.net/lists/keyrings/msg01846.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/keyrings/msg01846.html"},{"reference_url":"http://www.spinics.net/lists/keyrings/msg01849.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/keyrings/msg01849.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1433252","reference_id":"1433252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1433252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6951","reference_id":"CVE-2017-6951","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2017-6951"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jsc3-j8v3-x7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82832?format=json","vulnerability_id":"VCID-kehv-3zaj-mbhd","summary":"security update","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8890","reference_id":"","reference_type":"","scores":[{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60873","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64834","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.648","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a"},{"reference_url":"https://source.android.com/security/bulletin/2017-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-09-01"},{"reference_url":"http://www.debian.org/security/2017/dsa-3886","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3886"},{"reference_url":"http://www.securityfocus.com/bid/98562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450972","reference_id":"1450972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450972"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8890","reference_id":"CVE-2017-8890","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-8890"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kehv-3zaj-mbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84779?format=json","vulnerability_id":"VCID-khhv-2xey-5faz","summary":"kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8645","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09358","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09442","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09414","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09507","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09436","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393904","reference_id":"1393904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3161-1/","reference_id":"USN-3161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-1/"},{"reference_url":"https://usn.ubuntu.com/3161-2/","reference_id":"USN-3161-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-2/"},{"reference_url":"https://usn.ubuntu.com/3161-3/","reference_id":"USN-3161-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-3/"},{"reference_url":"https://usn.ubuntu.com/3161-4/","reference_id":"USN-3161-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-4/"},{"reference_url":"https://usn.ubuntu.com/3162-1/","reference_id":"USN-3162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3162-1/"},{"reference_url":"https://usn.ubuntu.com/3162-2/","reference_id":"USN-3162-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3162-2/"},{"reference_url":"https://usn.ubuntu.com/3290-1/","reference_id":"USN-3290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3290-1/"}],"fixed_packages":[],"aliases":["CVE-2016-8645"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khhv-2xey-5faz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84494?format=json","vulnerability_id":"VCID-mpgy-hb3y-1kg8","summary":"kernel: ping socket / AF_LLC connect() sin_family race","references":[{"reference_url":"http://openwall.com/lists/oss-security/2017/04/04/8","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2017/04/04/8"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2671","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.5002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.4999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49995","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49976","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/danieljiang0415/android_kernel_crash_poc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/danieljiang0415/android_kernel_crash_poc"},{"reference_url":"https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893"},{"reference_url":"https://twitter.com/danieljiang0415/status/845116665184497664","reference_id":"","reference_type":"","scores":[],"url":"https://twitter.com/danieljiang0415/status/845116665184497664"},{"reference_url":"https://www.exploit-db.com/exploits/42135/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/42135/"},{"reference_url":"http://www.securityfocus.com/bid/97407","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97407"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1436649","reference_id":"1436649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1436649"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c","reference_id":"CVE-2017-2671","reference_type":"exploit","scores":[],"url":"https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c","reference_id":"CVE-2017-2671","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2671","reference_id":"CVE-2017-2671","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3314-1/","reference_id":"USN-3314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3314-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3754-1/","reference_id":"USN-3754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3754-1/"}],"fixed_packages":[],"aliases":["CVE-2017-2671"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mpgy-hb3y-1kg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85141?format=json","vulnerability_id":"VCID-nbej-d99f-3uar","summary":"kernel: netlink: double-free in netlink_dump","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9806","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0787","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07891","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07756","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07909","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401502","reference_id":"1401502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3168-1/","reference_id":"USN-3168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3168-1/"},{"reference_url":"https://usn.ubuntu.com/3168-2/","reference_id":"USN-3168-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3168-2/"}],"fixed_packages":[],"aliases":["CVE-2016-9806"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbej-d99f-3uar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82194?format=json","vulnerability_id":"VCID-qmfy-8xcx-b3e6","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6001","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30255","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3015","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422825","reference_id":"1422825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422825"},{"reference_url":"https://security.archlinux.org/AVG-187","reference_id":"AVG-187","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-187"},{"reference_url":"https://security.archlinux.org/AVG-188","reference_id":"AVG-188","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"}],"fixed_packages":[],"aliases":["CVE-2017-6001"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmfy-8xcx-b3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82837?format=json","vulnerability_id":"VCID-qwqd-dej5-xkd7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9074","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452679","reference_id":"1452679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0169","reference_id":"RHSA-2018:0169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0169"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"},{"reference_url":"https://usn.ubuntu.com/3360-2/","reference_id":"USN-3360-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3360-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9074"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwqd-dej5-xkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84223?format=json","vulnerability_id":"VCID-sp53-ynj8-h3c1","summary":"kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8797","reference_id":"","reference_type":"","scores":[{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96665","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96675","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.9668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.9671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30423","scoring_system":"epss","scoring_elements":"0.96713","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466329","reference_id":"1466329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2437","reference_id":"RHSA-2017:2437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"}],"fixed_packages":[],"aliases":["CVE-2017-8797"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sp53-ynj8-h3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84723?format=json","vulnerability_id":"VCID-vtfd-4bee-5bhb","summary":"kernel: Memory leaks in xfs_attr_list.c error paths","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9685.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9685","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20256","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20035","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19911","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19875","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1396941","reference_id":"1396941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1396941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3187-1/","reference_id":"USN-3187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3187-1/"},{"reference_url":"https://usn.ubuntu.com/3187-2/","reference_id":"USN-3187-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3187-2/"}],"fixed_packages":[],"aliases":["CVE-2016-9685"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vtfd-4bee-5bhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84446?format=json","vulnerability_id":"VCID-w9zu-qksj-uyh1","summary":"kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user","references":[{"reference_url":"http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html","reference_id":"","reference_type":"","scores":[],"url":"http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9604.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9604","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04725","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04995","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04881","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04763","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9604"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=1035576","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=1035576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:N"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee8f844e3c5a73b999edf733df1c529d6503ec2f"},{"reference_url":"http://www.securityfocus.com/bid/102135","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102135"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389433","reference_id":"1389433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389433"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9604","reference_id":"CVE-2016-9604","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3314-1/","reference_id":"USN-3314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3314-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2016-9604"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9zu-qksj-uyh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84739?format=json","vulnerability_id":"VCID-wkt1-8h3a-m3dr","summary":"kernel: Use after free in SCSI generic device interface","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9576","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19828","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19881","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19762","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19665","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19631","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1403145","reference_id":"1403145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1403145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0817","reference_id":"RHSA-2017:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"}],"fixed_packages":[],"aliases":["CVE-2016-9576"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkt1-8h3a-m3dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82839?format=json","vulnerability_id":"VCID-xd6f-766q-mkh8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9075","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452691","reference_id":"1452691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9075"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6f-766q-mkh8"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@1:3.10.0-693.2.1.rt56.585%3Farch=el6rt"}