{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88732?format=json","vulnerability_id":"VCID-8zkt-6zb3-c3gx","summary":"fib_semantics.c out of bounds access vulnerability","aliases":[{"alias":"CVE-2007-2172"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/128910?format=json","purl":"pkg:rpm/redhat/kernel@2.4.9-e?arch=74","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6a1a-z32k-3bec"},{"vulnerability":"VCID-8zkt-6zb3-c3gx"},{"vulnerability":"VCID-9epb-x1za-vyed"},{"vulnerability":"VCID-cf2v-zn7q-b3gd"},{"vulnerability":"VCID-d3j2-c5ey-pqbe"},{"vulnerability":"VCID-d91v-h4jm-bffj"},{"vulnerability":"VCID-dajb-npd8-6bhn"},{"vulnerability":"VCID-dk79-tsxh-jqfa"},{"vulnerability":"VCID-e1fa-s8q2-3fbv"},{"vulnerability":"VCID-hjz4-81cy-w7az"},{"vulnerability":"VCID-mn7v-1n4p-z3f2"},{"vulnerability":"VCID-syk6-6hck-hka9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.9-e%3Farch=74"},{"url":"http://public2.vulnerablecode.io/api/packages/128909?format=json","purl":"pkg:rpm/redhat/kernel@2.4.18-e?arch=67","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6a1a-z32k-3bec"},{"vulnerability":"VCID-8zkt-6zb3-c3gx"},{"vulnerability":"VCID-9epb-x1za-vyed"},{"vulnerability":"VCID-cf2v-zn7q-b3gd"},{"vulnerability":"VCID-d3j2-c5ey-pqbe"},{"vulnerability":"VCID-d91v-h4jm-bffj"},{"vulnerability":"VCID-dajb-npd8-6bhn"},{"vulnerability":"VCID-dk79-tsxh-jqfa"},{"vulnerability":"VCID-e1fa-s8q2-3fbv"},{"vulnerability":"VCID-hjz4-81cy-w7az"},{"vulnerability":"VCID-mn7v-1n4p-z3f2"},{"vulnerability":"VCID-q7rz-jbh9-3qef"},{"vulnerability":"VCID-syk6-6hck-hka9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.18-e%3Farch=67"},{"url":"http://public2.vulnerablecode.io/api/packages/129665?format=json","purl":"pkg:rpm/redhat/kernel@2.4.21-53?arch=EL","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8zkt-6zb3-c3gx"},{"vulnerability":"VCID-dajb-npd8-6bhn"},{"vulnerability":"VCID-g983-n195-6uf3"},{"vulnerability":"VCID-q7rz-jbh9-3qef"},{"vulnerability":"VCID-syk6-6hck-hka9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-53%3Farch=EL"},{"url":"http://public2.vulnerablecode.io/api/packages/129762?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-55.0.2?arch=EL","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7b8r-52ay-bya5"},{"vulnerability":"VCID-8zkt-6zb3-c3gx"},{"vulnerability":"VCID-fhcd-dq5d-a7f6"},{"vulnerability":"VCID-twzs-a58k-e3du"},{"vulnerability":"VCID-udff-qxdp-dqdx"},{"vulnerability":"VCID-ueb5-5huh-kbcf"},{"vulnerability":"VCID-v4g8-g3ux-wfh4"},{"vulnerability":"VCID-xpmf-cu3q-47cn"},{"vulnerability":"VCID-zrgc-dxex-gbhb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-55.0.2%3Farch=EL"},{"url":"http://public2.vulnerablecode.io/api/packages/129845?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-8.1.4?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8zkt-6zb3-c3gx"},{"vulnerability":"VCID-e369-3x2v-z3en"},{"vulnerability":"VCID-ffvn-r9aa-9kfx"},{"vulnerability":"VCID-h435-jgmw-wqfy"},{"vulnerability":"VCID-t54k-cats-bub4"},{"vulnerability":"VCID-yv7n-zx93-s7b7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-8.1.4%3Farch=el5"}],"references":[{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172"},{"reference_url":"http://secunia.com/advisories/25068","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25068"},{"reference_url":"http://secunia.com/advisories/25288","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25288"},{"reference_url":"http://secunia.com/advisories/25392","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25392"},{"reference_url":"http://secunia.com/advisories/25838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25838"},{"reference_url":"http://secunia.com/advisories/26289","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26289"},{"reference_url":"http://secunia.com/advisories/26450","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26450"},{"reference_url":"http://secunia.com/advisories/26620","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26620"},{"reference_url":"http://secunia.com/advisories/26647","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26647"},{"reference_url":"http://secunia.com/advisories/27913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27913"},{"reference_url":"http://secunia.com/advisories/29058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29058"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1356","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1356"},{"reference_url":"http://www.debian.org/security/2007/dsa-1363","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1363"},{"reference_url":"http://www.debian.org/security/2008/dsa-1503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1503"},{"reference_url":"http://www.debian.org/security/2008/dsa-1504","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1504"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.securityfocus.com/bid/23447","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23447"},{"reference_url":"http://www.ubuntu.com/usn/usn-464-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-464-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2690","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429","reference_id":"250429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172","reference_id":"CVE-2007-2172","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0347","reference_id":"RHSA-2007:0347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0488","reference_id":"RHSA-2007:0488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/464-1/","reference_id":"USN-464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/464-1/"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[],"severity_range_score":"4.7 - 4.7","exploitability":"0.5","weighted_severity":"4.2","risk_score":2.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx"}