Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
Typedeb
Namespacedebian
Namentp
Version1:4.2.8p9+dfsg-1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:4.2.8p9+dfsg-2
Latest_non_vulnerable_version1:4.2.8p15+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1dne-8jh8-xbhw
vulnerability_id VCID-1dne-8jh8-xbhw
summary ntp: Broken initial sync calculations regression
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7433.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7433
reference_id
reference_type
scores
0
value 0.06848
scoring_system epss
scoring_elements 0.91308
published_at 2026-04-01T12:55:00Z
1
value 0.06848
scoring_system epss
scoring_elements 0.91391
published_at 2026-04-29T12:55:00Z
2
value 0.06848
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-18T12:55:00Z
3
value 0.06848
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-24T12:55:00Z
4
value 0.06848
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-26T12:55:00Z
5
value 0.06848
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-02T12:55:00Z
6
value 0.06848
scoring_system epss
scoring_elements 0.91323
published_at 2026-04-04T12:55:00Z
7
value 0.06848
scoring_system epss
scoring_elements 0.9133
published_at 2026-04-07T12:55:00Z
8
value 0.06848
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-08T12:55:00Z
9
value 0.06848
scoring_system epss
scoring_elements 0.91349
published_at 2026-04-09T12:55:00Z
10
value 0.06848
scoring_system epss
scoring_elements 0.91356
published_at 2026-04-11T12:55:00Z
11
value 0.06848
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-13T12:55:00Z
12
value 0.06848
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397347
reference_id 1397347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397347
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://access.redhat.com/errata/RHSA-2017:0252
reference_id RHSA-2017:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0252
9
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7433
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dne-8jh8-xbhw
1
url VCID-51cg-3jb8-p3cd
vulnerability_id VCID-51cg-3jb8-p3cd
summary ntp: Client rate limiting and server responses
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7426.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7426
reference_id
reference_type
scores
0
value 0.11683
scoring_system epss
scoring_elements 0.9364
published_at 2026-04-01T12:55:00Z
1
value 0.11683
scoring_system epss
scoring_elements 0.93707
published_at 2026-04-26T12:55:00Z
2
value 0.11683
scoring_system epss
scoring_elements 0.93702
published_at 2026-04-18T12:55:00Z
3
value 0.11683
scoring_system epss
scoring_elements 0.93705
published_at 2026-04-29T12:55:00Z
4
value 0.11683
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-24T12:55:00Z
5
value 0.11683
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-02T12:55:00Z
6
value 0.11683
scoring_system epss
scoring_elements 0.9366
published_at 2026-04-04T12:55:00Z
7
value 0.11683
scoring_system epss
scoring_elements 0.93662
published_at 2026-04-07T12:55:00Z
8
value 0.11683
scoring_system epss
scoring_elements 0.93671
published_at 2026-04-08T12:55:00Z
9
value 0.11683
scoring_system epss
scoring_elements 0.93673
published_at 2026-04-09T12:55:00Z
10
value 0.11683
scoring_system epss
scoring_elements 0.93677
published_at 2026-04-12T12:55:00Z
11
value 0.11683
scoring_system epss
scoring_elements 0.93678
published_at 2026-04-13T12:55:00Z
12
value 0.11683
scoring_system epss
scoring_elements 0.93696
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397345
reference_id 1397345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397345
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://access.redhat.com/errata/RHSA-2017:0252
reference_id RHSA-2017:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0252
9
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
10
reference_url https://usn.ubuntu.com/3707-2/
reference_id USN-3707-2
reference_type
scores
url https://usn.ubuntu.com/3707-2/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7426
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51cg-3jb8-p3cd
2
url VCID-8g74-qxd6-jfcz
vulnerability_id VCID-8g74-qxd6-jfcz
summary ntp: Broadcast Mode Replay Prevention DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7427.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7427
reference_id
reference_type
scores
0
value 0.05301
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-01T12:55:00Z
1
value 0.05301
scoring_system epss
scoring_elements 0.90056
published_at 2026-04-26T12:55:00Z
2
value 0.05301
scoring_system epss
scoring_elements 0.90039
published_at 2026-04-18T12:55:00Z
3
value 0.05301
scoring_system epss
scoring_elements 0.90037
published_at 2026-04-21T12:55:00Z
4
value 0.05301
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-29T12:55:00Z
5
value 0.05301
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-02T12:55:00Z
6
value 0.05301
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-04T12:55:00Z
7
value 0.05301
scoring_system epss
scoring_elements 0.9
published_at 2026-04-07T12:55:00Z
8
value 0.05301
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-08T12:55:00Z
9
value 0.05301
scoring_system epss
scoring_elements 0.90022
published_at 2026-04-09T12:55:00Z
10
value 0.05301
scoring_system epss
scoring_elements 0.90031
published_at 2026-04-11T12:55:00Z
11
value 0.05301
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-12T12:55:00Z
12
value 0.05301
scoring_system epss
scoring_elements 0.90023
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397329
reference_id 1397329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397329
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
9
reference_url https://usn.ubuntu.com/3707-2/
reference_id USN-3707-2
reference_type
scores
url https://usn.ubuntu.com/3707-2/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7427
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g74-qxd6-jfcz
3
url VCID-94qw-ahj9-r3as
vulnerability_id VCID-94qw-ahj9-r3as
summary ntp: Zero Origin timestamp regression
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7431.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7431
reference_id
reference_type
scores
0
value 0.18621
scoring_system epss
scoring_elements 0.95228
published_at 2026-04-01T12:55:00Z
1
value 0.18621
scoring_system epss
scoring_elements 0.95283
published_at 2026-04-29T12:55:00Z
2
value 0.18621
scoring_system epss
scoring_elements 0.95274
published_at 2026-04-16T12:55:00Z
3
value 0.18621
scoring_system epss
scoring_elements 0.95277
published_at 2026-04-18T12:55:00Z
4
value 0.18621
scoring_system epss
scoring_elements 0.9528
published_at 2026-04-24T12:55:00Z
5
value 0.18621
scoring_system epss
scoring_elements 0.9524
published_at 2026-04-02T12:55:00Z
6
value 0.18621
scoring_system epss
scoring_elements 0.95243
published_at 2026-04-04T12:55:00Z
7
value 0.18621
scoring_system epss
scoring_elements 0.95247
published_at 2026-04-07T12:55:00Z
8
value 0.18621
scoring_system epss
scoring_elements 0.95254
published_at 2026-04-08T12:55:00Z
9
value 0.18621
scoring_system epss
scoring_elements 0.95257
published_at 2026-04-09T12:55:00Z
10
value 0.18621
scoring_system epss
scoring_elements 0.95262
published_at 2026-04-11T12:55:00Z
11
value 0.18621
scoring_system epss
scoring_elements 0.95263
published_at 2026-04-12T12:55:00Z
12
value 0.18621
scoring_system epss
scoring_elements 0.95266
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397331
reference_id 1397331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397331
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7431
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-94qw-ahj9-r3as
4
url VCID-b3ax-se39-4bbd
vulnerability_id VCID-b3ax-se39-4bbd
summary ntp: Mode 6 unauthenticated trap information disclosure and DDoS vector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9310.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9310
reference_id
reference_type
scores
0
value 0.02227
scoring_system epss
scoring_elements 0.84445
published_at 2026-04-01T12:55:00Z
1
value 0.02227
scoring_system epss
scoring_elements 0.84577
published_at 2026-04-29T12:55:00Z
2
value 0.02227
scoring_system epss
scoring_elements 0.84566
published_at 2026-04-24T12:55:00Z
3
value 0.02227
scoring_system epss
scoring_elements 0.84574
published_at 2026-04-26T12:55:00Z
4
value 0.02227
scoring_system epss
scoring_elements 0.8446
published_at 2026-04-02T12:55:00Z
5
value 0.02227
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-04T12:55:00Z
6
value 0.02227
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-07T12:55:00Z
7
value 0.02227
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-08T12:55:00Z
8
value 0.02227
scoring_system epss
scoring_elements 0.84508
published_at 2026-04-09T12:55:00Z
9
value 0.02227
scoring_system epss
scoring_elements 0.84526
published_at 2026-04-11T12:55:00Z
10
value 0.02227
scoring_system epss
scoring_elements 0.84522
published_at 2026-04-12T12:55:00Z
11
value 0.02227
scoring_system epss
scoring_elements 0.84517
published_at 2026-04-13T12:55:00Z
12
value 0.02227
scoring_system epss
scoring_elements 0.84538
published_at 2026-04-18T12:55:00Z
13
value 0.02227
scoring_system epss
scoring_elements 0.8454
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397319
reference_id 1397319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397319
4
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
5
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
6
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
7
reference_url https://access.redhat.com/errata/RHSA-2017:0252
reference_id RHSA-2017:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0252
8
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
9
reference_url https://usn.ubuntu.com/3707-2/
reference_id USN-3707-2
reference_type
scores
url https://usn.ubuntu.com/3707-2/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-9310
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3ax-se39-4bbd
5
url VCID-h25b-hwuu-m7ck
vulnerability_id VCID-h25b-hwuu-m7ck
summary ntp: Attack on interface selection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7429.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7429
reference_id
reference_type
scores
0
value 0.05213
scoring_system epss
scoring_elements 0.89899
published_at 2026-04-01T12:55:00Z
1
value 0.05213
scoring_system epss
scoring_elements 0.89967
published_at 2026-04-29T12:55:00Z
2
value 0.05213
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-21T12:55:00Z
3
value 0.05213
scoring_system epss
scoring_elements 0.89969
published_at 2026-04-24T12:55:00Z
4
value 0.05213
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-26T12:55:00Z
5
value 0.05213
scoring_system epss
scoring_elements 0.89902
published_at 2026-04-02T12:55:00Z
6
value 0.05213
scoring_system epss
scoring_elements 0.89914
published_at 2026-04-04T12:55:00Z
7
value 0.05213
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-07T12:55:00Z
8
value 0.05213
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-08T12:55:00Z
9
value 0.05213
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-09T12:55:00Z
10
value 0.05213
scoring_system epss
scoring_elements 0.89951
published_at 2026-04-11T12:55:00Z
11
value 0.05213
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-12T12:55:00Z
12
value 0.05213
scoring_system epss
scoring_elements 0.89942
published_at 2026-04-13T12:55:00Z
13
value 0.05213
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-16T12:55:00Z
14
value 0.05213
scoring_system epss
scoring_elements 0.89957
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397341
reference_id 1397341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397341
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://access.redhat.com/errata/RHSA-2017:0252
reference_id RHSA-2017:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0252
9
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7429
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h25b-hwuu-m7ck
6
url VCID-p9b7-s3jc-sbaq
vulnerability_id VCID-p9b7-s3jc-sbaq
summary ntp: read_mru_list() does inadequate incoming packet checks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7434.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7434
reference_id
reference_type
scores
0
value 0.62378
scoring_system epss
scoring_elements 0.9835
published_at 2026-04-01T12:55:00Z
1
value 0.62378
scoring_system epss
scoring_elements 0.98372
published_at 2026-04-29T12:55:00Z
2
value 0.62378
scoring_system epss
scoring_elements 0.98367
published_at 2026-04-21T12:55:00Z
3
value 0.62378
scoring_system epss
scoring_elements 0.98371
published_at 2026-04-24T12:55:00Z
4
value 0.62378
scoring_system epss
scoring_elements 0.98373
published_at 2026-04-26T12:55:00Z
5
value 0.62378
scoring_system epss
scoring_elements 0.98352
published_at 2026-04-02T12:55:00Z
6
value 0.62378
scoring_system epss
scoring_elements 0.98355
published_at 2026-04-04T12:55:00Z
7
value 0.62378
scoring_system epss
scoring_elements 0.98357
published_at 2026-04-07T12:55:00Z
8
value 0.62378
scoring_system epss
scoring_elements 0.98362
published_at 2026-04-08T12:55:00Z
9
value 0.62378
scoring_system epss
scoring_elements 0.98363
published_at 2026-04-09T12:55:00Z
10
value 0.62378
scoring_system epss
scoring_elements 0.98366
published_at 2026-04-12T12:55:00Z
11
value 0.62378
scoring_system epss
scoring_elements 0.98365
published_at 2026-04-13T12:55:00Z
12
value 0.62378
scoring_system epss
scoring_elements 0.98369
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397334
reference_id 1397334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397334
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40806.py
reference_id CVE-2016-7434
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40806.py
9
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7434
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9b7-s3jc-sbaq
7
url VCID-pqur-4fx6-akc6
vulnerability_id VCID-pqur-4fx6-akc6
summary ntp: Broadcast Mode Poll Interval Enforcement DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7428.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7428
reference_id
reference_type
scores
0
value 0.05301
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-01T12:55:00Z
1
value 0.05301
scoring_system epss
scoring_elements 0.90056
published_at 2026-04-26T12:55:00Z
2
value 0.05301
scoring_system epss
scoring_elements 0.90039
published_at 2026-04-18T12:55:00Z
3
value 0.05301
scoring_system epss
scoring_elements 0.90037
published_at 2026-04-21T12:55:00Z
4
value 0.05301
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-29T12:55:00Z
5
value 0.05301
scoring_system epss
scoring_elements 0.89982
published_at 2026-04-02T12:55:00Z
6
value 0.05301
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-04T12:55:00Z
7
value 0.05301
scoring_system epss
scoring_elements 0.9
published_at 2026-04-07T12:55:00Z
8
value 0.05301
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-08T12:55:00Z
9
value 0.05301
scoring_system epss
scoring_elements 0.90022
published_at 2026-04-09T12:55:00Z
10
value 0.05301
scoring_system epss
scoring_elements 0.90031
published_at 2026-04-11T12:55:00Z
11
value 0.05301
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-12T12:55:00Z
12
value 0.05301
scoring_system epss
scoring_elements 0.90023
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397328
reference_id 1397328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397328
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
9
reference_url https://usn.ubuntu.com/3707-2/
reference_id USN-3707-2
reference_type
scores
url https://usn.ubuntu.com/3707-2/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-7428
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqur-4fx6-akc6
8
url VCID-x36x-83tn-kkf4
vulnerability_id VCID-x36x-83tn-kkf4
summary ntp: Null pointer dereference when trap service is enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9311.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9311
reference_id
reference_type
scores
0
value 0.04785
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-01T12:55:00Z
1
value 0.04785
scoring_system epss
scoring_elements 0.89504
published_at 2026-04-29T12:55:00Z
2
value 0.04785
scoring_system epss
scoring_elements 0.89485
published_at 2026-04-21T12:55:00Z
3
value 0.04785
scoring_system epss
scoring_elements 0.89499
published_at 2026-04-24T12:55:00Z
4
value 0.04785
scoring_system epss
scoring_elements 0.89503
published_at 2026-04-26T12:55:00Z
5
value 0.04785
scoring_system epss
scoring_elements 0.89438
published_at 2026-04-02T12:55:00Z
6
value 0.04785
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-04T12:55:00Z
7
value 0.04785
scoring_system epss
scoring_elements 0.89451
published_at 2026-04-07T12:55:00Z
8
value 0.04785
scoring_system epss
scoring_elements 0.89467
published_at 2026-04-08T12:55:00Z
9
value 0.04785
scoring_system epss
scoring_elements 0.89471
published_at 2026-04-09T12:55:00Z
10
value 0.04785
scoring_system epss
scoring_elements 0.8948
published_at 2026-04-11T12:55:00Z
11
value 0.04785
scoring_system epss
scoring_elements 0.89478
published_at 2026-04-12T12:55:00Z
12
value 0.04785
scoring_system epss
scoring_elements 0.89473
published_at 2026-04-13T12:55:00Z
13
value 0.04785
scoring_system epss
scoring_elements 0.89487
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9311
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1398350
reference_id 1398350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1398350
5
reference_url https://security.archlinux.org/ASA-201611-28
reference_id ASA-201611-28
reference_type
scores
url https://security.archlinux.org/ASA-201611-28
6
reference_url https://security.archlinux.org/AVG-79
reference_id AVG-79
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-79
7
reference_url https://security.archlinux.org/AVG-80
reference_id AVG-80
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-80
8
reference_url https://access.redhat.com/errata/RHSA-2017:0252
reference_id RHSA-2017:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0252
9
reference_url https://usn.ubuntu.com/3349-1/
reference_id USN-3349-1
reference_type
scores
url https://usn.ubuntu.com/3349-1/
10
reference_url https://usn.ubuntu.com/3707-2/
reference_id USN-3707-2
reference_type
scores
url https://usn.ubuntu.com/3707-2/
fixed_packages
0
url pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye
1
url pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
purl pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye
aliases CVE-2016-9311
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x36x-83tn-kkf4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p9%252Bdfsg-1%3Fdistro=bullseye