Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@3.10.0-514.21.1.rt56.438?arch=el7
Typerpm
Namespaceredhat
Namekernel-rt
Version3.10.0-514.21.1.rt56.438
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-45qw-a51e-8kcp
vulnerability_id VCID-45qw-a51e-8kcp
summary kernel: net/packet: overflow in check for priv area size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7308
reference_id
reference_type
scores
0
value 0.87
scoring_system epss
scoring_elements 0.9943
published_at 2026-04-02T12:55:00Z
1
value 0.87
scoring_system epss
scoring_elements 0.99441
published_at 2026-04-29T12:55:00Z
2
value 0.87
scoring_system epss
scoring_elements 0.99437
published_at 2026-04-13T12:55:00Z
3
value 0.87
scoring_system epss
scoring_elements 0.99439
published_at 2026-04-21T12:55:00Z
4
value 0.87
scoring_system epss
scoring_elements 0.9944
published_at 2026-04-24T12:55:00Z
5
value 0.87
scoring_system epss
scoring_elements 0.99432
published_at 2026-04-07T12:55:00Z
6
value 0.87
scoring_system epss
scoring_elements 0.99433
published_at 2026-04-08T12:55:00Z
7
value 0.87
scoring_system epss
scoring_elements 0.99434
published_at 2026-04-09T12:55:00Z
8
value 0.87
scoring_system epss
scoring_elements 0.99435
published_at 2026-04-11T12:55:00Z
9
value 0.87
scoring_system epss
scoring_elements 0.99436
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
reference_id
reference_type
scores
url https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
5
reference_url https://patchwork.ozlabs.org/patch/744811/
reference_id
reference_type
scores
url https://patchwork.ozlabs.org/patch/744811/
6
reference_url https://patchwork.ozlabs.org/patch/744812/
reference_id
reference_type
scores
url https://patchwork.ozlabs.org/patch/744812/
7
reference_url https://patchwork.ozlabs.org/patch/744813/
reference_id
reference_type
scores
url https://patchwork.ozlabs.org/patch/744813/
8
reference_url https://source.android.com/security/bulletin/2017-07-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-07-01
9
reference_url https://www.exploit-db.com/exploits/41994/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/41994/
10
reference_url https://www.exploit-db.com/exploits/44654/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44654/
11
reference_url http://www.securityfocus.com/bid/97234
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97234
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1437404
reference_id 1437404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1437404
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c
reference_id CVE-2017-7308
reference_type exploit
scores
url https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c
15
reference_url https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c
reference_id CVE-2017-7308
reference_type exploit
scores
url https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c
reference_id CVE-2017-7308
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c
17
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb
reference_id CVE-2017-7308
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb
18
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c
reference_id CVE-2017-7308
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7308
reference_id CVE-2017-7308
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7308
20
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb
reference_id CVE-2017-7308
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb
21
reference_url https://access.redhat.com/errata/RHSA-2017:1297
reference_id RHSA-2017:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1297
22
reference_url https://access.redhat.com/errata/RHSA-2017:1298
reference_id RHSA-2017:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1298
23
reference_url https://access.redhat.com/errata/RHSA-2017:1308
reference_id RHSA-2017:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1308
24
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
25
reference_url https://usn.ubuntu.com/3256-1/
reference_id USN-3256-1
reference_type
scores
url https://usn.ubuntu.com/3256-1/
26
reference_url https://usn.ubuntu.com/3256-2/
reference_id USN-3256-2
reference_type
scores
url https://usn.ubuntu.com/3256-2/
fixed_packages
aliases CVE-2017-7308
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45qw-a51e-8kcp
1
url VCID-4kkf-z6ve-ubh6
vulnerability_id VCID-4kkf-z6ve-ubh6
summary kernel: EXT4 memory corruption / SLAB out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10208.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10208
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16378
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16288
published_at 2026-04-29T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16333
published_at 2026-04-24T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16332
published_at 2026-04-26T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16558
published_at 2026-04-02T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1662
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16505
published_at 2026-04-08T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16559
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16541
published_at 2026-04-11T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16502
published_at 2026-04-12T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16444
published_at 2026-04-13T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16384
published_at 2026-04-16T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16404
published_at 2026-04-18T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16441
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1395190
reference_id 1395190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1395190
5
reference_url https://access.redhat.com/errata/RHSA-2017:1297
reference_id RHSA-2017:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1297
6
reference_url https://access.redhat.com/errata/RHSA-2017:1298
reference_id RHSA-2017:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1298
7
reference_url https://access.redhat.com/errata/RHSA-2017:1308
reference_id RHSA-2017:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1308
8
reference_url https://usn.ubuntu.com/3234-1/
reference_id USN-3234-1
reference_type
scores
url https://usn.ubuntu.com/3234-1/
9
reference_url https://usn.ubuntu.com/3234-2/
reference_id USN-3234-2
reference_type
scores
url https://usn.ubuntu.com/3234-2/
10
reference_url https://usn.ubuntu.com/3361-1/
reference_id USN-3361-1
reference_type
scores
url https://usn.ubuntu.com/3361-1/
11
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2016-10208
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kkf-z6ve-ubh6
2
url VCID-ak28-2yn6-fuh4
vulnerability_id VCID-ak28-2yn6-fuh4
summary kernel: Use after free in seq file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7910.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7910
reference_id
reference_type
scores
0
value 0.00259
scoring_system epss
scoring_elements 0.49169
published_at 2026-04-01T12:55:00Z
1
value 0.00259
scoring_system epss
scoring_elements 0.49196
published_at 2026-04-29T12:55:00Z
2
value 0.00259
scoring_system epss
scoring_elements 0.4924
published_at 2026-04-21T12:55:00Z
3
value 0.00259
scoring_system epss
scoring_elements 0.49237
published_at 2026-04-26T12:55:00Z
4
value 0.00259
scoring_system epss
scoring_elements 0.49201
published_at 2026-04-02T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49229
published_at 2026-04-24T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.4918
published_at 2026-04-07T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49235
published_at 2026-04-08T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49231
published_at 2026-04-09T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49249
published_at 2026-04-11T12:55:00Z
10
value 0.00259
scoring_system epss
scoring_elements 0.49221
published_at 2026-04-12T12:55:00Z
11
value 0.00259
scoring_system epss
scoring_elements 0.49227
published_at 2026-04-13T12:55:00Z
12
value 0.00259
scoring_system epss
scoring_elements 0.49273
published_at 2026-04-16T12:55:00Z
13
value 0.00259
scoring_system epss
scoring_elements 0.4927
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1399727
reference_id 1399727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1399727
5
reference_url https://access.redhat.com/errata/RHSA-2017:0892
reference_id RHSA-2017:0892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0892
6
reference_url https://access.redhat.com/errata/RHSA-2017:1297
reference_id RHSA-2017:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1297
7
reference_url https://access.redhat.com/errata/RHSA-2017:1298
reference_id RHSA-2017:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1298
8
reference_url https://access.redhat.com/errata/RHSA-2017:1308
reference_id RHSA-2017:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1308
9
reference_url https://usn.ubuntu.com/3206-1/
reference_id USN-3206-1
reference_type
scores
url https://usn.ubuntu.com/3206-1/
10
reference_url https://usn.ubuntu.com/3207-1/
reference_id USN-3207-1
reference_type
scores
url https://usn.ubuntu.com/3207-1/
11
reference_url https://usn.ubuntu.com/3207-2/
reference_id USN-3207-2
reference_type
scores
url https://usn.ubuntu.com/3207-2/
fixed_packages
aliases CVE-2016-7910
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ak28-2yn6-fuh4
3
url VCID-gn59-k2sn-bfhm
vulnerability_id VCID-gn59-k2sn-bfhm
summary kernel: Oops in shash_async_export()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8646.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8646
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09799
published_at 2026-04-01T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09889
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09935
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09824
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09899
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09951
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09964
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09926
published_at 2026-04-12T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09905
published_at 2026-04-13T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09789
published_at 2026-04-16T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09761
published_at 2026-04-18T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09907
published_at 2026-04-21T12:55:00Z
12
value 0.00034
scoring_system epss
scoring_elements 0.09948
published_at 2026-04-24T12:55:00Z
13
value 0.00034
scoring_system epss
scoring_elements 0.09911
published_at 2026-04-26T12:55:00Z
14
value 0.00034
scoring_system epss
scoring_elements 0.09864
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388821
reference_id 1388821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388821
5
reference_url https://access.redhat.com/errata/RHSA-2017:1297
reference_id RHSA-2017:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1297
6
reference_url https://access.redhat.com/errata/RHSA-2017:1298
reference_id RHSA-2017:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1298
7
reference_url https://access.redhat.com/errata/RHSA-2017:1308
reference_id RHSA-2017:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1308
fixed_packages
aliases CVE-2016-8646
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gn59-k2sn-bfhm
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-514.21.1.rt56.438%3Farch=el7