Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@3.10.0-514.10.2.rt56.435?arch=el7
Typerpm
Namespaceredhat
Namekernel-rt
Version3.10.0-514.10.2.rt56.435
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3m2e-pzkb-3kct
vulnerability_id VCID-3m2e-pzkb-3kct
summary kernel: Race condition in packet_set_ring leads to use after free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8655
reference_id
reference_type
scores
0
value 0.34922
scoring_system epss
scoring_elements 0.9705
published_at 2026-05-07T12:55:00Z
1
value 0.34922
scoring_system epss
scoring_elements 0.97035
published_at 2026-04-18T12:55:00Z
2
value 0.34922
scoring_system epss
scoring_elements 0.97039
published_at 2026-04-21T12:55:00Z
3
value 0.34922
scoring_system epss
scoring_elements 0.97041
published_at 2026-04-24T12:55:00Z
4
value 0.34922
scoring_system epss
scoring_elements 0.97043
published_at 2026-04-26T12:55:00Z
5
value 0.34922
scoring_system epss
scoring_elements 0.97044
published_at 2026-04-29T12:55:00Z
6
value 0.34922
scoring_system epss
scoring_elements 0.97046
published_at 2026-05-05T12:55:00Z
7
value 0.38274
scoring_system epss
scoring_elements 0.97213
published_at 2026-04-07T12:55:00Z
8
value 0.38274
scoring_system epss
scoring_elements 0.97223
published_at 2026-04-09T12:55:00Z
9
value 0.38274
scoring_system epss
scoring_elements 0.97227
published_at 2026-04-11T12:55:00Z
10
value 0.38274
scoring_system epss
scoring_elements 0.97228
published_at 2026-04-13T12:55:00Z
11
value 0.38274
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-16T12:55:00Z
12
value 0.38274
scoring_system epss
scoring_elements 0.972
published_at 2026-04-01T12:55:00Z
13
value 0.38274
scoring_system epss
scoring_elements 0.97207
published_at 2026-04-02T12:55:00Z
14
value 0.38274
scoring_system epss
scoring_elements 0.97212
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1400019
reference_id 1400019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1400019
5
reference_url https://security.archlinux.org/ASA-201612-6
reference_id ASA-201612-6
reference_type
scores
url https://security.archlinux.org/ASA-201612-6
6
reference_url https://security.archlinux.org/ASA-201612-7
reference_id ASA-201612-7
reference_type
scores
url https://security.archlinux.org/ASA-201612-7
7
reference_url https://security.archlinux.org/ASA-201612-8
reference_id ASA-201612-8
reference_type
scores
url https://security.archlinux.org/ASA-201612-8
8
reference_url https://security.archlinux.org/AVG-95
reference_id AVG-95
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-95
9
reference_url https://security.archlinux.org/AVG-96
reference_id AVG-96
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-96
10
reference_url https://security.archlinux.org/AVG-98
reference_id AVG-98
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-98
11
reference_url http://seclists.org/oss-sec/2016/q4/607
reference_id CVE-2016-8655
reference_type exploit
scores
url http://seclists.org/oss-sec/2016/q4/607
12
reference_url https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c
reference_id CVE-2016-8655
reference_type exploit
scores
url https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb
reference_id CVE-2016-8655
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c
reference_id CVE-2016-8655
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c
reference_id CVE-2016-8655
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c
16
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb
reference_id CVE-2016-8655
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb
17
reference_url https://access.redhat.com/errata/RHSA-2017:0386
reference_id RHSA-2017:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0386
18
reference_url https://access.redhat.com/errata/RHSA-2017:0387
reference_id RHSA-2017:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0387
19
reference_url https://access.redhat.com/errata/RHSA-2017:0402
reference_id RHSA-2017:0402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0402
20
reference_url https://usn.ubuntu.com/3149-1/
reference_id USN-3149-1
reference_type
scores
url https://usn.ubuntu.com/3149-1/
21
reference_url https://usn.ubuntu.com/3149-2/
reference_id USN-3149-2
reference_type
scores
url https://usn.ubuntu.com/3149-2/
22
reference_url https://usn.ubuntu.com/3150-1/
reference_id USN-3150-1
reference_type
scores
url https://usn.ubuntu.com/3150-1/
23
reference_url https://usn.ubuntu.com/3150-2/
reference_id USN-3150-2
reference_type
scores
url https://usn.ubuntu.com/3150-2/
24
reference_url https://usn.ubuntu.com/3151-1/
reference_id USN-3151-1
reference_type
scores
url https://usn.ubuntu.com/3151-1/
25
reference_url https://usn.ubuntu.com/3151-2/
reference_id USN-3151-2
reference_type
scores
url https://usn.ubuntu.com/3151-2/
26
reference_url https://usn.ubuntu.com/3151-3/
reference_id USN-3151-3
reference_type
scores
url https://usn.ubuntu.com/3151-3/
27
reference_url https://usn.ubuntu.com/3151-4/
reference_id USN-3151-4
reference_type
scores
url https://usn.ubuntu.com/3151-4/
28
reference_url https://usn.ubuntu.com/3152-1/
reference_id USN-3152-1
reference_type
scores
url https://usn.ubuntu.com/3152-1/
29
reference_url https://usn.ubuntu.com/3152-2/
reference_id USN-3152-2
reference_type
scores
url https://usn.ubuntu.com/3152-2/
fixed_packages
aliases CVE-2016-8655
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m2e-pzkb-3kct
1
url VCID-4fxd-fxb3-9fgf
vulnerability_id VCID-4fxd-fxb3-9fgf
summary kernel: State machine confusion bug in vfio driver leading to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9083
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14698
published_at 2026-04-12T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14748
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14823
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14627
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14716
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14776
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14736
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14645
published_at 2026-04-13T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14537
published_at 2026-04-16T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14543
published_at 2026-04-18T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14607
published_at 2026-04-21T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14638
published_at 2026-04-24T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14635
published_at 2026-04-26T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14574
published_at 2026-04-29T12:55:00Z
14
value 0.00047
scoring_system epss
scoring_elements 0.14452
published_at 2026-05-05T12:55:00Z
15
value 0.00047
scoring_system epss
scoring_elements 0.14587
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1389258
reference_id 1389258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1389258
5
reference_url https://access.redhat.com/errata/RHSA-2017:0386
reference_id RHSA-2017:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0386
6
reference_url https://access.redhat.com/errata/RHSA-2017:0387
reference_id RHSA-2017:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0387
7
reference_url https://usn.ubuntu.com/3312-1/
reference_id USN-3312-1
reference_type
scores
url https://usn.ubuntu.com/3312-1/
8
reference_url https://usn.ubuntu.com/3312-2/
reference_id USN-3312-2
reference_type
scores
url https://usn.ubuntu.com/3312-2/
9
reference_url https://usn.ubuntu.com/3361-1/
reference_id USN-3361-1
reference_type
scores
url https://usn.ubuntu.com/3361-1/
10
reference_url https://usn.ubuntu.com/3422-1/
reference_id USN-3422-1
reference_type
scores
url https://usn.ubuntu.com/3422-1/
11
reference_url https://usn.ubuntu.com/3422-2/
reference_id USN-3422-2
reference_type
scores
url https://usn.ubuntu.com/3422-2/
fixed_packages
aliases CVE-2016-9083
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fxd-fxb3-9fgf
2
url VCID-b9n6-363a-pqgj
vulnerability_id VCID-b9n6-363a-pqgj
summary kernel: kvm: x86: NULL pointer dereference during instruction decode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8630
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08671
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08817
published_at 2026-05-07T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08737
published_at 2026-04-29T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08665
published_at 2026-05-05T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-02T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08747
published_at 2026-04-04T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08672
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08748
published_at 2026-04-08T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08774
published_at 2026-04-09T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08775
published_at 2026-04-11T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08753
published_at 2026-04-12T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08738
published_at 2026-04-13T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08626
published_at 2026-04-16T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08615
published_at 2026-04-18T12:55:00Z
14
value 0.00031
scoring_system epss
scoring_elements 0.08768
published_at 2026-04-21T12:55:00Z
15
value 0.00031
scoring_system epss
scoring_elements 0.0878
published_at 2026-04-24T12:55:00Z
16
value 0.00031
scoring_system epss
scoring_elements 0.08734
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8630
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1393350
reference_id 1393350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1393350
5
reference_url https://access.redhat.com/errata/RHSA-2017:0386
reference_id RHSA-2017:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0386
6
reference_url https://access.redhat.com/errata/RHSA-2017:0387
reference_id RHSA-2017:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0387
7
reference_url https://usn.ubuntu.com/3161-1/
reference_id USN-3161-1
reference_type
scores
url https://usn.ubuntu.com/3161-1/
8
reference_url https://usn.ubuntu.com/3161-2/
reference_id USN-3161-2
reference_type
scores
url https://usn.ubuntu.com/3161-2/
9
reference_url https://usn.ubuntu.com/3161-3/
reference_id USN-3161-3
reference_type
scores
url https://usn.ubuntu.com/3161-3/
10
reference_url https://usn.ubuntu.com/3161-4/
reference_id USN-3161-4
reference_type
scores
url https://usn.ubuntu.com/3161-4/
11
reference_url https://usn.ubuntu.com/3162-1/
reference_id USN-3162-1
reference_type
scores
url https://usn.ubuntu.com/3162-1/
12
reference_url https://usn.ubuntu.com/3162-2/
reference_id USN-3162-2
reference_type
scores
url https://usn.ubuntu.com/3162-2/
fixed_packages
aliases CVE-2016-8630
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9n6-363a-pqgj
3
url VCID-qgte-zhf5-jbak
vulnerability_id VCID-qgte-zhf5-jbak
summary kernel: Integer overflow when using kzalloc in vfio driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9084
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15774
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15843
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15909
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15709
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15794
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15854
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15833
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15797
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15727
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15648
published_at 2026-04-16T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15657
published_at 2026-04-18T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15703
published_at 2026-04-21T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.1572
published_at 2026-04-24T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.15716
published_at 2026-04-26T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15659
published_at 2026-04-29T12:55:00Z
15
value 0.00051
scoring_system epss
scoring_elements 0.15529
published_at 2026-05-05T12:55:00Z
16
value 0.00051
scoring_system epss
scoring_elements 0.1565
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1389259
reference_id 1389259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1389259
5
reference_url https://access.redhat.com/errata/RHSA-2017:0386
reference_id RHSA-2017:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0386
6
reference_url https://access.redhat.com/errata/RHSA-2017:0387
reference_id RHSA-2017:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0387
7
reference_url https://usn.ubuntu.com/3312-1/
reference_id USN-3312-1
reference_type
scores
url https://usn.ubuntu.com/3312-1/
8
reference_url https://usn.ubuntu.com/3312-2/
reference_id USN-3312-2
reference_type
scores
url https://usn.ubuntu.com/3312-2/
9
reference_url https://usn.ubuntu.com/3361-1/
reference_id USN-3361-1
reference_type
scores
url https://usn.ubuntu.com/3361-1/
10
reference_url https://usn.ubuntu.com/3422-1/
reference_id USN-3422-1
reference_type
scores
url https://usn.ubuntu.com/3422-1/
11
reference_url https://usn.ubuntu.com/3422-2/
reference_id USN-3422-2
reference_type
scores
url https://usn.ubuntu.com/3422-2/
fixed_packages
aliases CVE-2016-9084
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgte-zhf5-jbak
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-514.10.2.rt56.435%3Farch=el7