Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@3.10.0-327.46.1?arch=el7
Typerpm
Namespaceredhat
Namekernel
Version3.10.0-327.46.1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-f8h3-j8zt-dya3
vulnerability_id VCID-f8h3-j8zt-dya3
summary kernel: Use-after-free in the recvmmsg exit path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7117.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7117
reference_id
reference_type
scores
0
value 0.10558
scoring_system epss
scoring_elements 0.93242
published_at 2026-04-01T12:55:00Z
1
value 0.10558
scoring_system epss
scoring_elements 0.93318
published_at 2026-05-07T12:55:00Z
2
value 0.10558
scoring_system epss
scoring_elements 0.93298
published_at 2026-04-29T12:55:00Z
3
value 0.10558
scoring_system epss
scoring_elements 0.93304
published_at 2026-05-05T12:55:00Z
4
value 0.10558
scoring_system epss
scoring_elements 0.9325
published_at 2026-04-02T12:55:00Z
5
value 0.10558
scoring_system epss
scoring_elements 0.93256
published_at 2026-04-04T12:55:00Z
6
value 0.10558
scoring_system epss
scoring_elements 0.93254
published_at 2026-04-07T12:55:00Z
7
value 0.10558
scoring_system epss
scoring_elements 0.93263
published_at 2026-04-08T12:55:00Z
8
value 0.10558
scoring_system epss
scoring_elements 0.93267
published_at 2026-04-09T12:55:00Z
9
value 0.10558
scoring_system epss
scoring_elements 0.93271
published_at 2026-04-13T12:55:00Z
10
value 0.10558
scoring_system epss
scoring_elements 0.93269
published_at 2026-04-12T12:55:00Z
11
value 0.10558
scoring_system epss
scoring_elements 0.93288
published_at 2026-04-16T12:55:00Z
12
value 0.10558
scoring_system epss
scoring_elements 0.93293
published_at 2026-04-18T12:55:00Z
13
value 0.10558
scoring_system epss
scoring_elements 0.933
published_at 2026-04-21T12:55:00Z
14
value 0.10558
scoring_system epss
scoring_elements 0.93306
published_at 2026-04-24T12:55:00Z
15
value 0.10558
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1382268
reference_id 1382268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1382268
5
reference_url https://access.redhat.com/errata/RHSA-2016:2962
reference_id RHSA-2016:2962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2962
6
reference_url https://access.redhat.com/errata/RHSA-2017:0031
reference_id RHSA-2017:0031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0031
7
reference_url https://access.redhat.com/errata/RHSA-2017:0036
reference_id RHSA-2017:0036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0036
8
reference_url https://access.redhat.com/errata/RHSA-2017:0065
reference_id RHSA-2017:0065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0065
9
reference_url https://access.redhat.com/errata/RHSA-2017:0086
reference_id RHSA-2017:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0086
10
reference_url https://access.redhat.com/errata/RHSA-2017:0091
reference_id RHSA-2017:0091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0091
11
reference_url https://access.redhat.com/errata/RHSA-2017:0113
reference_id RHSA-2017:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0113
12
reference_url https://access.redhat.com/errata/RHSA-2017:0196
reference_id RHSA-2017:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0196
13
reference_url https://access.redhat.com/errata/RHSA-2017:0215
reference_id RHSA-2017:0215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0215
14
reference_url https://access.redhat.com/errata/RHSA-2017:0216
reference_id RHSA-2017:0216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0216
15
reference_url https://access.redhat.com/errata/RHSA-2017:0217
reference_id RHSA-2017:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0217
16
reference_url https://access.redhat.com/errata/RHSA-2017:0270
reference_id RHSA-2017:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0270
17
reference_url https://usn.ubuntu.com/3126-1/
reference_id USN-3126-1
reference_type
scores
url https://usn.ubuntu.com/3126-1/
18
reference_url https://usn.ubuntu.com/3126-2/
reference_id USN-3126-2
reference_type
scores
url https://usn.ubuntu.com/3126-2/
fixed_packages
aliases CVE-2016-7117
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8h3-j8zt-dya3
1
url VCID-whmb-4jhy-4keu
vulnerability_id VCID-whmb-4jhy-4keu
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=759c01142a5d0f364a462346168a56de28a80f52
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=759c01142a5d0f364a462346168a56de28a80f52
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-2574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2574.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-2584.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2584.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2017-0217.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0217.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2847.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2847.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2847
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22125
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21931
published_at 2026-05-07T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.21965
published_at 2026-04-26T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.21952
published_at 2026-04-29T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.21858
published_at 2026-05-05T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22283
published_at 2026-04-02T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22112
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22195
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22249
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22268
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22227
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22166
published_at 2026-04-13T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.22167
published_at 2026-04-16T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.22162
published_at 2026-04-18T12:55:00Z
15
value 0.00073
scoring_system epss
scoring_elements 0.22117
published_at 2026-04-21T12:55:00Z
16
value 0.00073
scoring_system epss
scoring_elements 0.21977
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2847
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://github.com/torvalds/linux/commit/759c01142a5d0f364a462346168a56de28a80f52
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/759c01142a5d0f364a462346168a56de28a80f52
30
reference_url http://www.debian.org/security/2016/dsa-3503
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3503
31
reference_url http://www.openwall.com/lists/oss-security/2016/03/01/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/01/3
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
33
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
34
reference_url http://www.securityfocus.com/bid/83870
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83870
35
reference_url http://www.ubuntu.com/usn/USN-2946-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2946-1
36
reference_url http://www.ubuntu.com/usn/USN-2946-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2946-2
37
reference_url http://www.ubuntu.com/usn/USN-2947-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2947-1
38
reference_url http://www.ubuntu.com/usn/USN-2947-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2947-2
39
reference_url http://www.ubuntu.com/usn/USN-2947-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2947-3
40
reference_url http://www.ubuntu.com/usn/USN-2948-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2948-1
41
reference_url http://www.ubuntu.com/usn/USN-2948-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2948-2
42
reference_url http://www.ubuntu.com/usn/USN-2949-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2949-1
43
reference_url http://www.ubuntu.com/usn/USN-2967-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2967-1
44
reference_url http://www.ubuntu.com/usn/USN-2967-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2967-2
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1313428
reference_id 1313428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1313428
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2847
reference_id CVE-2016-2847
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2847
64
reference_url https://access.redhat.com/errata/RHSA-2016:2574
reference_id RHSA-2016:2574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2574
65
reference_url https://access.redhat.com/errata/RHSA-2016:2584
reference_id RHSA-2016:2584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2584
66
reference_url https://access.redhat.com/errata/RHSA-2017:0217
reference_id RHSA-2017:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0217
67
reference_url https://usn.ubuntu.com/2946-1/
reference_id USN-2946-1
reference_type
scores
url https://usn.ubuntu.com/2946-1/
68
reference_url https://usn.ubuntu.com/2946-2/
reference_id USN-2946-2
reference_type
scores
url https://usn.ubuntu.com/2946-2/
69
reference_url https://usn.ubuntu.com/2947-1/
reference_id USN-2947-1
reference_type
scores
url https://usn.ubuntu.com/2947-1/
70
reference_url https://usn.ubuntu.com/2947-2/
reference_id USN-2947-2
reference_type
scores
url https://usn.ubuntu.com/2947-2/
71
reference_url https://usn.ubuntu.com/2947-3/
reference_id USN-2947-3
reference_type
scores
url https://usn.ubuntu.com/2947-3/
72
reference_url https://usn.ubuntu.com/2948-1/
reference_id USN-2948-1
reference_type
scores
url https://usn.ubuntu.com/2948-1/
73
reference_url https://usn.ubuntu.com/2949-1/
reference_id USN-2949-1
reference_type
scores
url https://usn.ubuntu.com/2949-1/
74
reference_url https://usn.ubuntu.com/2965-2/
reference_id USN-2965-2
reference_type
scores
url https://usn.ubuntu.com/2965-2/
75
reference_url https://usn.ubuntu.com/2967-1/
reference_id USN-2967-1
reference_type
scores
url https://usn.ubuntu.com/2967-1/
76
reference_url https://usn.ubuntu.com/2967-2/
reference_id USN-2967-2
reference_type
scores
url https://usn.ubuntu.com/2967-2/
fixed_packages
aliases CVE-2016-2847
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whmb-4jhy-4keu
Fixing_vulnerabilities
Risk_score3.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-327.46.1%3Farch=el7