Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-8zkt-6zb3-c3gx
Summaryfib_semantics.c out of bounds access vulnerability
Aliases
0
alias CVE-2007-2172
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.4.9-e?arch=74
purl pkg:rpm/redhat/kernel@2.4.9-e?arch=74
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6a1a-z32k-3bec
1
vulnerability VCID-8zkt-6zb3-c3gx
2
vulnerability VCID-9epb-x1za-vyed
3
vulnerability VCID-cf2v-zn7q-b3gd
4
vulnerability VCID-d3j2-c5ey-pqbe
5
vulnerability VCID-d91v-h4jm-bffj
6
vulnerability VCID-dajb-npd8-6bhn
7
vulnerability VCID-dk79-tsxh-jqfa
8
vulnerability VCID-e1fa-s8q2-3fbv
9
vulnerability VCID-hjz4-81cy-w7az
10
vulnerability VCID-mn7v-1n4p-z3f2
11
vulnerability VCID-syk6-6hck-hka9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.9-e%3Farch=74
1
url pkg:rpm/redhat/kernel@2.4.18-e?arch=67
purl pkg:rpm/redhat/kernel@2.4.18-e?arch=67
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6a1a-z32k-3bec
1
vulnerability VCID-8zkt-6zb3-c3gx
2
vulnerability VCID-9epb-x1za-vyed
3
vulnerability VCID-cf2v-zn7q-b3gd
4
vulnerability VCID-d3j2-c5ey-pqbe
5
vulnerability VCID-d91v-h4jm-bffj
6
vulnerability VCID-dajb-npd8-6bhn
7
vulnerability VCID-dk79-tsxh-jqfa
8
vulnerability VCID-e1fa-s8q2-3fbv
9
vulnerability VCID-hjz4-81cy-w7az
10
vulnerability VCID-mn7v-1n4p-z3f2
11
vulnerability VCID-q7rz-jbh9-3qef
12
vulnerability VCID-syk6-6hck-hka9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.18-e%3Farch=67
2
url pkg:rpm/redhat/kernel@2.4.21-53?arch=EL
purl pkg:rpm/redhat/kernel@2.4.21-53?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8zkt-6zb3-c3gx
1
vulnerability VCID-dajb-npd8-6bhn
2
vulnerability VCID-g983-n195-6uf3
3
vulnerability VCID-q7rz-jbh9-3qef
4
vulnerability VCID-syk6-6hck-hka9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-53%3Farch=EL
3
url pkg:rpm/redhat/kernel@2.6.9-55.0.2?arch=EL
purl pkg:rpm/redhat/kernel@2.6.9-55.0.2?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7b8r-52ay-bya5
1
vulnerability VCID-8zkt-6zb3-c3gx
2
vulnerability VCID-fhcd-dq5d-a7f6
3
vulnerability VCID-twzs-a58k-e3du
4
vulnerability VCID-udff-qxdp-dqdx
5
vulnerability VCID-ueb5-5huh-kbcf
6
vulnerability VCID-v4g8-g3ux-wfh4
7
vulnerability VCID-xpmf-cu3q-47cn
8
vulnerability VCID-zrgc-dxex-gbhb
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-55.0.2%3Farch=EL
4
url pkg:rpm/redhat/kernel@2.6.18-8.1.4?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-8.1.4?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8zkt-6zb3-c3gx
1
vulnerability VCID-e369-3x2v-z3en
2
vulnerability VCID-ffvn-r9aa-9kfx
3
vulnerability VCID-h435-jgmw-wqfy
4
vulnerability VCID-t54k-cats-bub4
5
vulnerability VCID-yv7n-zx93-s7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-8.1.4%3Farch=el5
References
0
reference_url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
1
reference_url http://rhn.redhat.com/errata/RHSA-2007-0488.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0488.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-29T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21708
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21927
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21692
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.2177
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21826
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21837
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21797
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21747
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-21T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21566
published_at 2026-04-24T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2156
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
4
reference_url http://secunia.com/advisories/25068
reference_id
reference_type
scores
url http://secunia.com/advisories/25068
5
reference_url http://secunia.com/advisories/25288
reference_id
reference_type
scores
url http://secunia.com/advisories/25288
6
reference_url http://secunia.com/advisories/25392
reference_id
reference_type
scores
url http://secunia.com/advisories/25392
7
reference_url http://secunia.com/advisories/25838
reference_id
reference_type
scores
url http://secunia.com/advisories/25838
8
reference_url http://secunia.com/advisories/26289
reference_id
reference_type
scores
url http://secunia.com/advisories/26289
9
reference_url http://secunia.com/advisories/26450
reference_id
reference_type
scores
url http://secunia.com/advisories/26450
10
reference_url http://secunia.com/advisories/26620
reference_id
reference_type
scores
url http://secunia.com/advisories/26620
11
reference_url http://secunia.com/advisories/26647
reference_id
reference_type
scores
url http://secunia.com/advisories/26647
12
reference_url http://secunia.com/advisories/27913
reference_id
reference_type
scores
url http://secunia.com/advisories/27913
13
reference_url http://secunia.com/advisories/29058
reference_id
reference_type
scores
url http://secunia.com/advisories/29058
14
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
17
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
18
reference_url http://www.debian.org/security/2007/dsa-1356
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1356
19
reference_url http://www.debian.org/security/2007/dsa-1363
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1363
20
reference_url http://www.debian.org/security/2008/dsa-1503
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1503
21
reference_url http://www.debian.org/security/2008/dsa-1504
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1504
22
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
23
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
24
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
28
reference_url http://www.redhat.com/support/errata/RHSA-2007-0347.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0347.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-1049.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-1049.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
31
reference_url http://www.securityfocus.com/bid/23447
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23447
32
reference_url http://www.ubuntu.com/usn/usn-464-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-464-1
33
reference_url http://www.vupen.com/english/advisories/2007/2690
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2690
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250429
reference_id 250429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250429
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
reference_id CVE-2007-2172
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
54
reference_url https://access.redhat.com/errata/RHSA-2007:0347
reference_id RHSA-2007:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0347
55
reference_url https://access.redhat.com/errata/RHSA-2007:0488
reference_id RHSA-2007:0488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0488
56
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
57
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
58
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
59
reference_url https://usn.ubuntu.com/464-1/
reference_id USN-464-1
reference_type
scores
url https://usn.ubuntu.com/464-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.7 - 4.7
Exploitability0.5
Weighted_severity4.2
Risk_score2.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx