Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
Typedeb
Namespacedebian
Namentp
Version1:4.2.8p8+dfsg-1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:4.2.8p9+dfsg-1
Latest_non_vulnerable_version1:4.2.8p15+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9ptx-ga5e-j7bs
vulnerability_id VCID-9ptx-ga5e-j7bs
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4956
reference_id
reference_type
scores
0
value 0.01098
scoring_system epss
scoring_elements 0.77965
published_at 2026-04-01T12:55:00Z
1
value 0.01098
scoring_system epss
scoring_elements 0.78057
published_at 2026-04-16T12:55:00Z
2
value 0.01098
scoring_system epss
scoring_elements 0.78056
published_at 2026-04-18T12:55:00Z
3
value 0.01098
scoring_system epss
scoring_elements 0.78049
published_at 2026-04-21T12:55:00Z
4
value 0.01098
scoring_system epss
scoring_elements 0.78082
published_at 2026-04-24T12:55:00Z
5
value 0.01098
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-26T12:55:00Z
6
value 0.01098
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-29T12:55:00Z
7
value 0.01098
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-02T12:55:00Z
8
value 0.01098
scoring_system epss
scoring_elements 0.78
published_at 2026-04-04T12:55:00Z
9
value 0.01098
scoring_system epss
scoring_elements 0.77983
published_at 2026-04-07T12:55:00Z
10
value 0.01098
scoring_system epss
scoring_elements 0.78009
published_at 2026-04-08T12:55:00Z
11
value 0.01098
scoring_system epss
scoring_elements 0.78014
published_at 2026-04-09T12:55:00Z
12
value 0.01098
scoring_system epss
scoring_elements 0.7804
published_at 2026-04-11T12:55:00Z
13
value 0.01098
scoring_system epss
scoring_elements 0.78023
published_at 2026-04-12T12:55:00Z
14
value 0.01098
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-13T12:55:00Z
15
value 0.01399
scoring_system epss
scoring_elements 0.80528
published_at 2026-05-07T12:55:00Z
16
value 0.01399
scoring_system epss
scoring_elements 0.80548
published_at 2026-05-09T12:55:00Z
17
value 0.01399
scoring_system epss
scoring_elements 0.80543
published_at 2026-05-11T12:55:00Z
18
value 0.01399
scoring_system epss
scoring_elements 0.8056
published_at 2026-05-12T12:55:00Z
19
value 0.01399
scoring_system epss
scoring_elements 0.80506
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340860
reference_id 1340860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340860
5
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
6
reference_url https://usn.ubuntu.com/3096-1/
reference_id USN-3096-1
reference_type
scores
url https://usn.ubuntu.com/3096-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-4956
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ptx-ga5e-j7bs
1
url VCID-agf3-5k1f-7ueg
vulnerability_id VCID-agf3-5k1f-7ueg
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4955.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4955
reference_id
reference_type
scores
0
value 0.01726
scoring_system epss
scoring_elements 0.82578
published_at 2026-05-12T12:55:00Z
1
value 0.01726
scoring_system epss
scoring_elements 0.82523
published_at 2026-05-05T12:55:00Z
2
value 0.01726
scoring_system epss
scoring_elements 0.82543
published_at 2026-05-07T12:55:00Z
3
value 0.01726
scoring_system epss
scoring_elements 0.82563
published_at 2026-05-09T12:55:00Z
4
value 0.01726
scoring_system epss
scoring_elements 0.82562
published_at 2026-05-11T12:55:00Z
5
value 0.01902
scoring_system epss
scoring_elements 0.83235
published_at 2026-04-09T12:55:00Z
6
value 0.01902
scoring_system epss
scoring_elements 0.83251
published_at 2026-04-11T12:55:00Z
7
value 0.01902
scoring_system epss
scoring_elements 0.83245
published_at 2026-04-12T12:55:00Z
8
value 0.01902
scoring_system epss
scoring_elements 0.8324
published_at 2026-04-13T12:55:00Z
9
value 0.01902
scoring_system epss
scoring_elements 0.83174
published_at 2026-04-01T12:55:00Z
10
value 0.01902
scoring_system epss
scoring_elements 0.83278
published_at 2026-04-18T12:55:00Z
11
value 0.01902
scoring_system epss
scoring_elements 0.83279
published_at 2026-04-21T12:55:00Z
12
value 0.01902
scoring_system epss
scoring_elements 0.83303
published_at 2026-04-24T12:55:00Z
13
value 0.01902
scoring_system epss
scoring_elements 0.83311
published_at 2026-04-26T12:55:00Z
14
value 0.01902
scoring_system epss
scoring_elements 0.83317
published_at 2026-04-29T12:55:00Z
15
value 0.01902
scoring_system epss
scoring_elements 0.83277
published_at 2026-04-16T12:55:00Z
16
value 0.01902
scoring_system epss
scoring_elements 0.83191
published_at 2026-04-02T12:55:00Z
17
value 0.01902
scoring_system epss
scoring_elements 0.83205
published_at 2026-04-04T12:55:00Z
18
value 0.01902
scoring_system epss
scoring_elements 0.83203
published_at 2026-04-07T12:55:00Z
19
value 0.01902
scoring_system epss
scoring_elements 0.83228
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340858
reference_id 1340858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340858
5
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
6
reference_url https://usn.ubuntu.com/3096-1/
reference_id USN-3096-1
reference_type
scores
url https://usn.ubuntu.com/3096-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-4955
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agf3-5k1f-7ueg
2
url VCID-cccx-mdbh-7uhd
vulnerability_id VCID-cccx-mdbh-7uhd
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4953.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4953
reference_id
reference_type
scores
0
value 0.13619
scoring_system epss
scoring_elements 0.94306
published_at 2026-05-12T12:55:00Z
1
value 0.13619
scoring_system epss
scoring_elements 0.94273
published_at 2026-05-05T12:55:00Z
2
value 0.13619
scoring_system epss
scoring_elements 0.94283
published_at 2026-05-07T12:55:00Z
3
value 0.13619
scoring_system epss
scoring_elements 0.94294
published_at 2026-05-09T12:55:00Z
4
value 0.13619
scoring_system epss
scoring_elements 0.94299
published_at 2026-05-11T12:55:00Z
5
value 0.14372
scoring_system epss
scoring_elements 0.94412
published_at 2026-04-09T12:55:00Z
6
value 0.14372
scoring_system epss
scoring_elements 0.94414
published_at 2026-04-11T12:55:00Z
7
value 0.14372
scoring_system epss
scoring_elements 0.94415
published_at 2026-04-12T12:55:00Z
8
value 0.14372
scoring_system epss
scoring_elements 0.94416
published_at 2026-04-13T12:55:00Z
9
value 0.14372
scoring_system epss
scoring_elements 0.94378
published_at 2026-04-01T12:55:00Z
10
value 0.14372
scoring_system epss
scoring_elements 0.94436
published_at 2026-04-29T12:55:00Z
11
value 0.14372
scoring_system epss
scoring_elements 0.94439
published_at 2026-04-21T12:55:00Z
12
value 0.14372
scoring_system epss
scoring_elements 0.9444
published_at 2026-04-24T12:55:00Z
13
value 0.14372
scoring_system epss
scoring_elements 0.94438
published_at 2026-04-26T12:55:00Z
14
value 0.14372
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-16T12:55:00Z
15
value 0.14372
scoring_system epss
scoring_elements 0.94386
published_at 2026-04-02T12:55:00Z
16
value 0.14372
scoring_system epss
scoring_elements 0.94397
published_at 2026-04-04T12:55:00Z
17
value 0.14372
scoring_system epss
scoring_elements 0.94398
published_at 2026-04-07T12:55:00Z
18
value 0.14372
scoring_system epss
scoring_elements 0.94408
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340852
reference_id 1340852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340852
5
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-4953
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cccx-mdbh-7uhd
3
url VCID-kv55-zcqa-mqds
vulnerability_id VCID-kv55-zcqa-mqds
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url http://bugs.ntp.org/3046
reference_id
reference_type
scores
url http://bugs.ntp.org/3046
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4957.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4957
reference_id
reference_type
scores
0
value 0.59072
scoring_system epss
scoring_elements 0.98247
published_at 2026-05-12T12:55:00Z
1
value 0.59072
scoring_system epss
scoring_elements 0.98237
published_at 2026-04-29T12:55:00Z
2
value 0.59072
scoring_system epss
scoring_elements 0.98244
published_at 2026-05-11T12:55:00Z
3
value 0.59072
scoring_system epss
scoring_elements 0.98213
published_at 2026-04-01T12:55:00Z
4
value 0.59072
scoring_system epss
scoring_elements 0.98216
published_at 2026-04-02T12:55:00Z
5
value 0.59072
scoring_system epss
scoring_elements 0.9822
published_at 2026-04-04T12:55:00Z
6
value 0.59072
scoring_system epss
scoring_elements 0.98221
published_at 2026-04-07T12:55:00Z
7
value 0.59072
scoring_system epss
scoring_elements 0.98225
published_at 2026-04-08T12:55:00Z
8
value 0.59072
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-09T12:55:00Z
9
value 0.59072
scoring_system epss
scoring_elements 0.98228
published_at 2026-04-13T12:55:00Z
10
value 0.59072
scoring_system epss
scoring_elements 0.98233
published_at 2026-04-21T12:55:00Z
11
value 0.59072
scoring_system epss
scoring_elements 0.98235
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4957
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
reference_id
reference_type
scores
url https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
11
reference_url http://support.ntp.org/bin/view/Main/NtpBug3046
reference_id
reference_type
scores
url http://support.ntp.org/bin/view/Main/NtpBug3046
12
reference_url http://support.ntp.org/bin/view/Main/SecurityNotice
reference_id
reference_type
scores
url http://support.ntp.org/bin/view/Main/SecurityNotice
13
reference_url http://www.kb.cert.org/vuls/id/321640
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/321640
14
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
15
reference_url http://www.securitytracker.com/id/1036037
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036037
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340850
reference_id 1340850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340850
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*
reference_id cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4957
reference_id CVE-2016-4957
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4957
32
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-4957
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kv55-zcqa-mqds
4
url VCID-uu6y-rp51-37dg
vulnerability_id VCID-uu6y-rp51-37dg
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4954.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4954
reference_id
reference_type
scores
0
value 0.02862
scoring_system epss
scoring_elements 0.86188
published_at 2026-04-01T12:55:00Z
1
value 0.02862
scoring_system epss
scoring_elements 0.8625
published_at 2026-04-13T12:55:00Z
2
value 0.02862
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-16T12:55:00Z
3
value 0.02862
scoring_system epss
scoring_elements 0.86271
published_at 2026-04-18T12:55:00Z
4
value 0.02862
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-21T12:55:00Z
5
value 0.02862
scoring_system epss
scoring_elements 0.86283
published_at 2026-04-24T12:55:00Z
6
value 0.02862
scoring_system epss
scoring_elements 0.86293
published_at 2026-04-29T12:55:00Z
7
value 0.02862
scoring_system epss
scoring_elements 0.86199
published_at 2026-04-02T12:55:00Z
8
value 0.02862
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-07T12:55:00Z
9
value 0.02862
scoring_system epss
scoring_elements 0.86231
published_at 2026-04-08T12:55:00Z
10
value 0.02862
scoring_system epss
scoring_elements 0.86242
published_at 2026-04-09T12:55:00Z
11
value 0.02862
scoring_system epss
scoring_elements 0.86257
published_at 2026-04-11T12:55:00Z
12
value 0.02862
scoring_system epss
scoring_elements 0.86254
published_at 2026-04-12T12:55:00Z
13
value 0.05471
scoring_system epss
scoring_elements 0.90258
published_at 2026-05-11T12:55:00Z
14
value 0.05471
scoring_system epss
scoring_elements 0.90268
published_at 2026-05-12T12:55:00Z
15
value 0.05471
scoring_system epss
scoring_elements 0.90238
published_at 2026-05-05T12:55:00Z
16
value 0.05471
scoring_system epss
scoring_elements 0.90253
published_at 2026-05-07T12:55:00Z
17
value 0.05471
scoring_system epss
scoring_elements 0.90264
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302225
reference_id 1302225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302225
5
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
6
reference_url https://usn.ubuntu.com/3096-1/
reference_id USN-3096-1
reference_type
scores
url https://usn.ubuntu.com/3096-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p8%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-4954
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uu6y-rp51-37dg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p8%252Bdfsg-1%3Fdistro=bullseye