{"url":"http://public2.vulnerablecode.io/api/packages/407001?format=json","purl":"pkg:apk/alpine/shadow@4.2.1-r11?arch=armv7&distroversion=v3.11&reponame=community","type":"apk","namespace":"alpine","name":"shadow","version":"4.2.1-r11","qualifiers":{"arch":"armv7","distroversion":"v3.11","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.5-r0","latest_non_vulnerable_version":"4.5-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38976?format=json","vulnerability_id":"VCID-a5ny-vcsw-uqh1","summary":"Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19227","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19096","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"},{"reference_url":"http://www.securitytracker.com/id/1038271","reference_id":"1038271","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securitytracker.com/id/1038271"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710","reference_id":"1418710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943","reference_id":"855943","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943"},{"reference_url":"http://www.securityfocus.com/bid/96404","reference_id":"96404","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securityfocus.com/bid/96404"},{"reference_url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891","reference_id":"dffab154d29a288aa171ff50263ecc8f2e14a891","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"},{"reference_url":"https://www.debian.org/security/2017/dsa-3793","reference_id":"dsa-3793","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://www.debian.org/security/2017/dsa-3793"},{"reference_url":"https://security.gentoo.org/glsa/201706-02","reference_id":"GLSA-201706-02","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://security.gentoo.org/glsa/201706-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0654","reference_id":"RHSA-2017:0654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0654"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html","reference_id":"RHSA-2017-0654.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0907","reference_id":"RHSA-2017:0907","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:0907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616","reference_id":"show_bug.cgi?id=CVE-2017-2616","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"reference_url":"https://usn.ubuntu.com/3276-1/","reference_id":"USN-3276-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-1/"},{"reference_url":"https://usn.ubuntu.com/3276-3/","reference_id":"USN-3276-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/407001?format=json","purl":"pkg:apk/alpine/shadow@4.2.1-r11?arch=armv7&distroversion=v3.11&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/shadow@4.2.1-r11%3Farch=armv7&distroversion=v3.11&reponame=community"}],"aliases":["(+","CVE-2017-2616","fix)","regression"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/shadow@4.2.1-r11%3Farch=armv7&distroversion=v3.11&reponame=community"}