{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","type":"ebuild","namespace":"net-misc","name":"ntp","version":"4.2.8_p8","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.2.8_p11","latest_non_vulnerable_version":"4.2.8_p16","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48821?format=json","vulnerability_id":"VCID-2bg6-f38v-mfb4","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7691.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7691","reference_id":"","reference_type":"","scores":[{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93716","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93727","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93735","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93746","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93757","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11753","scoring_system":"epss","scoring_elements":"0.93762","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254","reference_id":"1274254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7691"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bg6-f38v-mfb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48828?format=json","vulnerability_id":"VCID-2x34-cp4t-zfg2","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7705.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7705","reference_id":"","reference_type":"","scores":[{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96741","published_at":"2026-04-12T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96756","published_at":"2026-04-21T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.9676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96768","published_at":"2026-05-05T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96777","published_at":"2026-05-09T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96779","published_at":"2026-05-11T12:55:00Z"},{"value":"0.31029","scoring_system":"epss","scoring_elements":"0.96783","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274184","reference_id":"1274184","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274184"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7705"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2x34-cp4t-zfg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48859?format=json","vulnerability_id":"VCID-455e-2gzf-dqcg","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2517","reference_id":"","reference_type":"","scores":[{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86684","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03007","scoring_system":"epss","scoring_elements":"0.86672","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331467","reference_id":"1331467","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331467"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-2517"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-455e-2gzf-dqcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48858?format=json","vulnerability_id":"VCID-46tq-u6cu-pfdw","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2516.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2516.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2516","reference_id":"","reference_type":"","scores":[{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87947","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8783","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87878","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87922","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87938","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87934","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331466","reference_id":"1331466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331466"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-2516"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46tq-u6cu-pfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48846?format=json","vulnerability_id":"VCID-4bq3-mxur-cffv","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7979.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7979.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7979","reference_id":"","reference_type":"","scores":[{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88851","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.88844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04229","scoring_system":"epss","scoring_elements":"0.8884","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300271","reference_id":"1300271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300271"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7979"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bq3-mxur-cffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48838?format=json","vulnerability_id":"VCID-5qap-uacy-myhn","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7871.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7871","reference_id":"","reference_type":"","scores":[{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99082","published_at":"2026-04-01T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.9909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.991","published_at":"2026-04-26T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99101","published_at":"2026-05-05T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99103","published_at":"2026-05-07T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.7962","scoring_system":"epss","scoring_elements":"0.99105","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274265","reference_id":"1274265","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274265"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7871"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5qap-uacy-myhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48830?format=json","vulnerability_id":"VCID-7bjh-akmc-qqf3","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7849.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7849","reference_id":"","reference_type":"","scores":[{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88245","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88253","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88266","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88281","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88294","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0386","scoring_system":"epss","scoring_elements":"0.88305","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274257","reference_id":"1274257","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274257"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7849"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7bjh-akmc-qqf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48843?format=json","vulnerability_id":"VCID-7vfe-9r8z-8qfw","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7977.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7977","reference_id":"","reference_type":"","scores":[{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.9491","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.9483","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94889","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.949","published_at":"2026-05-09T12:55:00Z"},{"value":"0.16351","scoring_system":"epss","scoring_elements":"0.94905","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300269","reference_id":"1300269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300269"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7977"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vfe-9r8z-8qfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48834?format=json","vulnerability_id":"VCID-8125-2asm-8qf3","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7852.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7852","reference_id":"","reference_type":"","scores":[{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85828","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.8585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85908","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85921","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.8593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85949","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85971","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85989","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.85987","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02702","scoring_system":"epss","scoring_elements":"0.86","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274261","reference_id":"1274261","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274261"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7852"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8125-2asm-8qf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48852?format=json","vulnerability_id":"VCID-87fn-1dnm-sfcz","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8158","reference_id":"","reference_type":"","scores":[{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92219","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92175","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92179","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92187","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.922","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08124","scoring_system":"epss","scoring_elements":"0.92212","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300273","reference_id":"1300273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300273"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-8158"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87fn-1dnm-sfcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48865?format=json","vulnerability_id":"VCID-9ptx-ga5e-j7bs","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4956.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4956","reference_id":"","reference_type":"","scores":[{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78056","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.77983","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.7804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01098","scoring_system":"epss","scoring_elements":"0.78021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01399","scoring_system":"epss","scoring_elements":"0.80528","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01399","scoring_system":"epss","scoring_elements":"0.80548","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01399","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01399","scoring_system":"epss","scoring_elements":"0.8056","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01399","scoring_system":"epss","scoring_elements":"0.80506","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340860","reference_id":"1340860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340860"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-4956"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ptx-ga5e-j7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48864?format=json","vulnerability_id":"VCID-agf3-5k1f-7ueg","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4955.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4955","reference_id":"","reference_type":"","scores":[{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82578","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82523","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82543","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82563","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82562","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.8324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83311","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83317","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01902","scoring_system":"epss","scoring_elements":"0.83228","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340858","reference_id":"1340858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340858"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-4955"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agf3-5k1f-7ueg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48823?format=json","vulnerability_id":"VCID-bdq9-z1yb-2kbp","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7701.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7701","reference_id":"","reference_type":"","scores":[{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93855","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.9392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93922","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93931","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93942","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93954","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93958","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12406","scoring_system":"epss","scoring_elements":"0.93963","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274255","reference_id":"1274255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274255"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7701"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdq9-z1yb-2kbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48851?format=json","vulnerability_id":"VCID-bp74-ac3t-mbh2","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8140.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8140","reference_id":"","reference_type":"","scores":[{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96684","published_at":"2026-05-12T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.9664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96657","published_at":"2026-04-29T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.96674","published_at":"2026-05-09T12:55:00Z"},{"value":"0.29857","scoring_system":"epss","scoring_elements":"0.9668","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300651","reference_id":"1300651","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300651"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-8140"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bp74-ac3t-mbh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48862?format=json","vulnerability_id":"VCID-cccx-mdbh-7uhd","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4953.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4953","reference_id":"","reference_type":"","scores":[{"value":"0.13619","scoring_system":"epss","scoring_elements":"0.94306","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13619","scoring_system":"epss","scoring_elements":"0.94273","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13619","scoring_system":"epss","scoring_elements":"0.94283","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13619","scoring_system":"epss","scoring_elements":"0.94294","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13619","scoring_system":"epss","scoring_elements":"0.94299","published_at":"2026-05-11T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.9444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94438","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.9443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94397","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14372","scoring_system":"epss","scoring_elements":"0.94408","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340852","reference_id":"1340852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340852"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-4953"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cccx-mdbh-7uhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48822?format=json","vulnerability_id":"VCID-e89z-wm4b-yfav","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7692.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7692","reference_id":"","reference_type":"","scores":[{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93089","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.9312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93117","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.9314","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10173","scoring_system":"epss","scoring_elements":"0.93148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12791","scoring_system":"epss","scoring_elements":"0.94045","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12791","scoring_system":"epss","scoring_elements":"0.94057","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12791","scoring_system":"epss","scoring_elements":"0.94068","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12791","scoring_system":"epss","scoring_elements":"0.94072","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12791","scoring_system":"epss","scoring_elements":"0.94076","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254","reference_id":"1274254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7692"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e89z-wm4b-yfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48837?format=json","vulnerability_id":"VCID-ekjj-73gr-uucg","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7855.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7855","reference_id":"","reference_type":"","scores":[{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98254","published_at":"2026-04-01T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.9826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.9827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.98278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.60116","scoring_system":"epss","scoring_elements":"0.9828","published_at":"2026-04-29T12:55:00Z"},{"value":"0.65699","scoring_system":"epss","scoring_elements":"0.98517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.65699","scoring_system":"epss","scoring_elements":"0.98516","published_at":"2026-05-07T12:55:00Z"},{"value":"0.65699","scoring_system":"epss","scoring_elements":"0.98519","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274264","reference_id":"1274264","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274264"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40840.py","reference_id":"CVE-2015-7855","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40840.py"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7855"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ekjj-73gr-uucg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48835?format=json","vulnerability_id":"VCID-emeb-yatw-7ber","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7853.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7853","reference_id":"","reference_type":"","scores":[{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.96995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97023","published_at":"2026-04-13T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97036","published_at":"2026-04-18T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.34954","scoring_system":"epss","scoring_elements":"0.97045","published_at":"2026-04-29T12:55:00Z"},{"value":"0.40561","scoring_system":"epss","scoring_elements":"0.97376","published_at":"2026-05-05T12:55:00Z"},{"value":"0.40561","scoring_system":"epss","scoring_elements":"0.97381","published_at":"2026-05-07T12:55:00Z"},{"value":"0.40561","scoring_system":"epss","scoring_elements":"0.97385","published_at":"2026-05-09T12:55:00Z"},{"value":"0.40561","scoring_system":"epss","scoring_elements":"0.9739","published_at":"2026-05-11T12:55:00Z"},{"value":"0.40561","scoring_system":"epss","scoring_elements":"0.97395","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274262","reference_id":"1274262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274262"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7853"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-emeb-yatw-7ber"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48832?format=json","vulnerability_id":"VCID-eqdk-6k22-cuc7","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7851.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7851","reference_id":"","reference_type":"","scores":[{"value":"0.00505","scoring_system":"epss","scoring_elements":"0.66255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00505","scoring_system":"epss","scoring_elements":"0.66298","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00505","scoring_system":"epss","scoring_elements":"0.6634","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00505","scoring_system":"epss","scoring_elements":"0.66312","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00505","scoring_system":"epss","scoring_elements":"0.66332","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67358","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.6731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67235","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67336","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67355","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67345","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67324","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274260","reference_id":"1274260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274260"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7851"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eqdk-6k22-cuc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48855?format=json","vulnerability_id":"VCID-eqgy-7qbk-a3dy","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1549.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1549","reference_id":"","reference_type":"","scores":[{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.7659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.7664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.7667","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76719","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331463","reference_id":"1331463","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331463"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-1549"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eqgy-7qbk-a3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48841?format=json","vulnerability_id":"VCID-f2xk-hsv5-qkdb","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7975.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7975","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61319","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.6144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.6147","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61421","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61531","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61493","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300267","reference_id":"1300267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300267"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7975"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2xk-hsv5-qkdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48831?format=json","vulnerability_id":"VCID-fjt7-b2e2-dkan","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7850.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7850.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7850","reference_id":"","reference_type":"","scores":[{"value":"0.02637","scoring_system":"epss","scoring_elements":"0.85775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02637","scoring_system":"epss","scoring_elements":"0.85797","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02637","scoring_system":"epss","scoring_elements":"0.85814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02637","scoring_system":"epss","scoring_elements":"0.85812","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02637","scoring_system":"epss","scoring_elements":"0.85825","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.8894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88953","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88951","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.88911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04346","scoring_system":"epss","scoring_elements":"0.8893","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274258","reference_id":"1274258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274258"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7850"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjt7-b2e2-dkan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48839?format=json","vulnerability_id":"VCID-g95w-rwhp-jbfa","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7973.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7973","reference_id":"","reference_type":"","scores":[{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92477","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92399","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92402","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92435","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92441","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.92466","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08603","scoring_system":"epss","scoring_elements":"0.9247","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300266","reference_id":"1300266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300266"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7973"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g95w-rwhp-jbfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48854?format=json","vulnerability_id":"VCID-gekf-p1d4-u3aw","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1548.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1548","reference_id":"","reference_type":"","scores":[{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83875","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02052","scoring_system":"epss","scoring_elements":"0.83879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90198","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90202","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90171","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05403","scoring_system":"epss","scoring_elements":"0.90187","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331462","reference_id":"1331462","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331462"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-1548"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gekf-p1d4-u3aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48842?format=json","vulnerability_id":"VCID-gh2t-ubsq-tfhk","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7976.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7976","reference_id":"","reference_type":"","scores":[{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.87044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86947","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86951","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86972","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86977","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.86979","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.87","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.87017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.87034","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03168","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300268","reference_id":"1300268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300268"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7976"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gh2t-ubsq-tfhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48840?format=json","vulnerability_id":"VCID-gmv2-6vng-3bg8","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7974.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7974.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7974","reference_id":"","reference_type":"","scores":[{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91949","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.92004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.92","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07826","scoring_system":"epss","scoring_elements":"0.91986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10689","scoring_system":"epss","scoring_elements":"0.93352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10689","scoring_system":"epss","scoring_elements":"0.93365","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10689","scoring_system":"epss","scoring_elements":"0.93375","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10689","scoring_system":"epss","scoring_elements":"0.93382","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297471","reference_id":"1297471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297471"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7974"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmv2-6vng-3bg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48824?format=json","vulnerability_id":"VCID-jvcq-8f1c-6ug1","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7702.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7702","reference_id":"","reference_type":"","scores":[{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82666","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82753","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82813","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82828","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254","reference_id":"1274254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274254"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7702"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcq-8f1c-6ug1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48836?format=json","vulnerability_id":"VCID-k5fx-jsj8-kuaj","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7854.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7854.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7854","reference_id":"","reference_type":"","scores":[{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88076","published_at":"2026-04-08T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.8812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88131","published_at":"2026-05-05T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88146","published_at":"2026-05-07T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.8816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88157","published_at":"2026-05-11T12:55:00Z"},{"value":"0.038","scoring_system":"epss","scoring_elements":"0.88171","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274263","reference_id":"1274263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274263"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7854"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k5fx-jsj8-kuaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48866?format=json","vulnerability_id":"VCID-kv55-zcqa-mqds","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"http://bugs.ntp.org/3046","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ntp.org/3046"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4957.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4957.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4957","reference_id":"","reference_type":"","scores":[{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98247","published_at":"2026-05-12T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98244","published_at":"2026-05-11T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.9822","published_at":"2026-04-04T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.59072","scoring_system":"epss","scoring_elements":"0.98235","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc"},{"reference_url":"http://support.ntp.org/bin/view/Main/NtpBug3046","reference_id":"","reference_type":"","scores":[],"url":"http://support.ntp.org/bin/view/Main/NtpBug3046"},{"reference_url":"http://support.ntp.org/bin/view/Main/SecurityNotice","reference_id":"","reference_type":"","scores":[],"url":"http://support.ntp.org/bin/view/Main/SecurityNotice"},{"reference_url":"http://www.kb.cert.org/vuls/id/321640","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/321640"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1036037","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036037"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340850","reference_id":"1340850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4957","reference_id":"CVE-2016-4957","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4957"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-4957"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kv55-zcqa-mqds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48860?format=json","vulnerability_id":"VCID-q2we-gzqu-2fbs","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2518.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2518","reference_id":"","reference_type":"","scores":[{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02043","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87634","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87617","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331468","reference_id":"1331468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331468"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-2518"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2we-gzqu-2fbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48853?format=json","vulnerability_id":"VCID-qbbv-dhn3-mqb4","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1547","reference_id":"","reference_type":"","scores":[{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87981","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8791","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.8793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87972","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03664","scoring_system":"epss","scoring_elements":"0.87969","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331461","reference_id":"1331461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331461"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-1547"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbbv-dhn3-mqb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48857?format=json","vulnerability_id":"VCID-qqzd-kpaa-pud5","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1551.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1551","reference_id":"","reference_type":"","scores":[{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76825","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76672","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76653","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76772","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76803","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.7682","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76809","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331465","reference_id":"1331465","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331465"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-1551"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqzd-kpaa-pud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48825?format=json","vulnerability_id":"VCID-s2wg-9bgr-x3b1","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7703.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7703","reference_id":"","reference_type":"","scores":[{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.9214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92162","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92176","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92184","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08074","scoring_system":"epss","scoring_elements":"0.92195","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254547","reference_id":"1254547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254547"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7703"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s2wg-9bgr-x3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48848?format=json","vulnerability_id":"VCID-s74w-2rgm-73aa","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8138","reference_id":"","reference_type":"","scores":[{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79516","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.7956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.7959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79598","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79631","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79691","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79709","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01278","scoring_system":"epss","scoring_elements":"0.79718","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299442","reference_id":"1299442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299442"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0063","reference_id":"RHSA-2016:0063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0063"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-8138"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s74w-2rgm-73aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48850?format=json","vulnerability_id":"VCID-tpay-bjkz-guhz","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8139","reference_id":"","reference_type":"","scores":[{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96704","published_at":"2026-05-12T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.9669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.96695","published_at":"2026-05-09T12:55:00Z"},{"value":"0.30064","scoring_system":"epss","scoring_elements":"0.967","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300654","reference_id":"1300654","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300654"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-8139"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tpay-bjkz-guhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48856?format=json","vulnerability_id":"VCID-u8yz-dknh-9khu","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1550.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1550","reference_id":"","reference_type":"","scores":[{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86965","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86859","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86896","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86939","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86952","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331464","reference_id":"1331464","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331464"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1141","reference_id":"RHSA-2016:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1552","reference_id":"RHSA-2016:1552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1552"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-1550"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8yz-dknh-9khu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48829?format=json","vulnerability_id":"VCID-untv-fb5t-3fbw","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7848.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7848","reference_id":"","reference_type":"","scores":[{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79442","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79462","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.7946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79533","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79569","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79582","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274256","reference_id":"1274256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274256"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7848"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-untv-fb5t-3fbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48863?format=json","vulnerability_id":"VCID-uu6y-rp51-37dg","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4954.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4954","reference_id":"","reference_type":"","scores":[{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86188","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86266","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02862","scoring_system":"epss","scoring_elements":"0.86254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05471","scoring_system":"epss","scoring_elements":"0.90258","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05471","scoring_system":"epss","scoring_elements":"0.90268","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05471","scoring_system":"epss","scoring_elements":"0.90238","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05471","scoring_system":"epss","scoring_elements":"0.90253","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05471","scoring_system":"epss","scoring_elements":"0.90264","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302225","reference_id":"1302225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302225"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-4954"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uu6y-rp51-37dg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48827?format=json","vulnerability_id":"VCID-vayx-vnuq-6bej","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7704.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7704","reference_id":"","reference_type":"","scores":[{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.9429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94302","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94312","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94349","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94357","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.9437","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94377","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13941","scoring_system":"epss","scoring_elements":"0.94383","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271070","reference_id":"1271070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271070"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1930","reference_id":"RHSA-2015:1930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2520","reference_id":"RHSA-2015:2520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2520"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7704"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vayx-vnuq-6bej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48845?format=json","vulnerability_id":"VCID-wtre-pdwa-37am","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7978.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7978","reference_id":"","reference_type":"","scores":[{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97437","published_at":"2026-04-01T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.9746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97475","published_at":"2026-04-21T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97473","published_at":"2026-04-24T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97481","published_at":"2026-05-05T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97484","published_at":"2026-05-07T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97487","published_at":"2026-05-09T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.9749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.42548","scoring_system":"epss","scoring_elements":"0.97495","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300270","reference_id":"1300270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300270"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0780","reference_id":"RHSA-2016:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/3096-1/","reference_id":"USN-3096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2015-7978"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wtre-pdwa-37am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48861?format=json","vulnerability_id":"VCID-z992-remm-4kec","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2519","reference_id":"","reference_type":"","scores":[{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92804","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92815","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92831","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.9286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92873","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92884","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09494","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331469","reference_id":"1331469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331469"},{"reference_url":"https://security.gentoo.org/glsa/201607-15","reference_id":"GLSA-201607-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-15"},{"reference_url":"https://usn.ubuntu.com/3349-1/","reference_id":"USN-3349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77668?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}],"aliases":["CVE-2016-2519"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z992-remm-4kec"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p8"}