{"url":"http://public2.vulnerablecode.io/api/packages/115497?format=json","purl":"pkg:rpm/redhat/ntp@4.2.6p5-10.el6?arch=1","type":"rpm","namespace":"redhat","name":"ntp","version":"4.2.6p5-10.el6","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48846?format=json","vulnerability_id":"VCID-4bq3-mxur-cffv","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7979.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7979.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7979","reference_id":"","reference_type":"","scores":[{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88805","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300271","reference_id":"1300271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300271"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[],"aliases":["CVE-2015-7979"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bq3-mxur-cffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48854?format=json","vulnerability_id":"VCID-gekf-p1d4-u3aw","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1548.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1548","reference_id":"","reference_type":"","scores":[{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83875","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90171","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331462","reference_id":"1331462","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331462"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1548"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gekf-p1d4-u3aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48860?format=json","vulnerability_id":"VCID-q2we-gzqu-2fbs","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2518.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2518","reference_id":"","reference_type":"","scores":[{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87617","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331468","reference_id":"1331468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331468"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[],"aliases":["CVE-2016-2518"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2we-gzqu-2fbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48853?format=json","vulnerability_id":"VCID-qbbv-dhn3-mqb4","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1547","reference_id":"","reference_type":"","scores":[{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8791","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8793","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331461","reference_id":"1331461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331461"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1547"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbbv-dhn3-mqb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48856?format=json","vulnerability_id":"VCID-u8yz-dknh-9khu","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1550.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1550","reference_id":"","reference_type":"","scores":[{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86859","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86896","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331464","reference_id":"1331464","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331464"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1550"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8yz-dknh-9khu"}],"fixing_vulnerabilities":[],"risk_score":"1.6","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ntp@4.2.6p5-10.el6%3Farch=1"}