Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-pztg-es3v-jkhw
Vulnerability ID VCID-pztg-es3v-jkhw
Aliases CVE-2017-2907
Summary security update
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2017-2907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2918
https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html
https://www.debian.org/security/2018/dsa-4248
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0414
cpe:2.3:a:blender:blender:2.78c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:blender:blender:2.78c:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2017-2907 https://nvd.nist.gov/vuln/detail/CVE-2017-2907
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2907
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2907
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-2907
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.77617
EPSS Score 0.01064
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:20:40.282588+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.0.0