{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85542?format=json","vulnerability_id":"VCID-zcp9-3aeu-hufa","summary":"ntp: config command can be used to set the pidfile and drift file paths","aliases":[{"alias":"CVE-2015-5196"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/116221?format=json","purl":"pkg:rpm/redhat/ntp@4.2.6p5-25?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2bg6-f38v-mfb4"},{"vulnerability":"VCID-4bq3-mxur-cffv"},{"vulnerability":"VCID-785m-s7at-puaq"},{"vulnerability":"VCID-7vfe-9r8z-8qfw"},{"vulnerability":"VCID-8125-2asm-8qf3"},{"vulnerability":"VCID-87fn-1dnm-sfcz"},{"vulnerability":"VCID-bdq9-z1yb-2kbp"},{"vulnerability":"VCID-e89z-wm4b-yfav"},{"vulnerability":"VCID-gmv2-6vng-3bg8"},{"vulnerability":"VCID-jvcq-8f1c-6ug1"},{"vulnerability":"VCID-s2wg-9bgr-x3b1"},{"vulnerability":"VCID-uumf-ryrk-hfce"},{"vulnerability":"VCID-vdw1-d12u-jfgu"},{"vulnerability":"VCID-wtre-pdwa-37am"},{"vulnerability":"VCID-zcp9-3aeu-hufa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ntp@4.2.6p5-25%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5196.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5196.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254547","reference_id":"1254547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1254547"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5196","reference_id":"CVE-2015-5196","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2583","reference_id":"RHSA-2016:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2583"},{"reference_url":"https://usn.ubuntu.com/2783-1/","reference_id":"USN-2783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2783-1/"}],"weaknesses":[{"cwe_id":73,"name":"External Control of File Name or Path","description":"The product allows user input to control or influence paths or file names that are used in filesystem operations."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcp9-3aeu-hufa"}