Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-431.1.2?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-431.1.2
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3h3m-411b-qybn
vulnerability_id VCID-3h3m-411b-qybn
summary several
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1801.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1801.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2141.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2141.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2141
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08753
published_at 2026-04-29T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08692
published_at 2026-04-01T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.0872
published_at 2026-04-02T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08768
published_at 2026-04-04T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08693
published_at 2026-04-07T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08769
published_at 2026-04-08T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08796
published_at 2026-04-09T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08797
published_at 2026-04-11T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08765
published_at 2026-04-12T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.0875
published_at 2026-04-13T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08637
published_at 2026-04-16T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08626
published_at 2026-04-18T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.0878
published_at 2026-04-21T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08793
published_at 2026-04-24T12:55:00Z
14
value 0.00031
scoring_system epss
scoring_elements 0.08749
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2141
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301
24
reference_url http://secunia.com/advisories/55055
reference_id
reference_type
scores
url http://secunia.com/advisories/55055
25
reference_url https://github.com/torvalds/linux/commit/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f
26
reference_url http://www.debian.org/security/2013/dsa-2766
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2766
27
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
29
reference_url http://www.openwall.com/lists/oss-security/2013/06/04/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/06/04/10
30
reference_url http://www.ubuntu.com/usn/USN-1899-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1899-1
31
reference_url http://www.ubuntu.com/usn/USN-1900-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1900-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=970873
reference_id 970873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=970873
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2141
reference_id CVE-2013-2141
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2141
43
reference_url https://access.redhat.com/errata/RHSA-2013:1264
reference_id RHSA-2013:1264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1264
44
reference_url https://access.redhat.com/errata/RHSA-2013:1292
reference_id RHSA-2013:1292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1292
45
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
46
reference_url https://usn.ubuntu.com/1833-1/
reference_id USN-1833-1
reference_type
scores
url https://usn.ubuntu.com/1833-1/
47
reference_url https://usn.ubuntu.com/1837-1/
reference_id USN-1837-1
reference_type
scores
url https://usn.ubuntu.com/1837-1/
48
reference_url https://usn.ubuntu.com/1839-1/
reference_id USN-1839-1
reference_type
scores
url https://usn.ubuntu.com/1839-1/
49
reference_url https://usn.ubuntu.com/1849-1/
reference_id USN-1849-1
reference_type
scores
url https://usn.ubuntu.com/1849-1/
50
reference_url https://usn.ubuntu.com/1880-1/
reference_id USN-1880-1
reference_type
scores
url https://usn.ubuntu.com/1880-1/
51
reference_url https://usn.ubuntu.com/1881-1/
reference_id USN-1881-1
reference_type
scores
url https://usn.ubuntu.com/1881-1/
52
reference_url https://usn.ubuntu.com/1882-1/
reference_id USN-1882-1
reference_type
scores
url https://usn.ubuntu.com/1882-1/
53
reference_url https://usn.ubuntu.com/1883-1/
reference_id USN-1883-1
reference_type
scores
url https://usn.ubuntu.com/1883-1/
54
reference_url https://usn.ubuntu.com/1899-1/
reference_id USN-1899-1
reference_type
scores
url https://usn.ubuntu.com/1899-1/
55
reference_url https://usn.ubuntu.com/1900-1/
reference_id USN-1900-1
reference_type
scores
url https://usn.ubuntu.com/1900-1/
fixed_packages
aliases CVE-2013-2141
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h3m-411b-qybn
1
url VCID-6eag-zuz2-2bce
vulnerability_id VCID-6eag-zuz2-2bce
summary kvm: division by zero in apic_get_tmcct()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6367.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6367
reference_id
reference_type
scores
0
value 0.00564
scoring_system epss
scoring_elements 0.68342
published_at 2026-04-01T12:55:00Z
1
value 0.00564
scoring_system epss
scoring_elements 0.68362
published_at 2026-04-02T12:55:00Z
2
value 0.00564
scoring_system epss
scoring_elements 0.68382
published_at 2026-04-04T12:55:00Z
3
value 0.00564
scoring_system epss
scoring_elements 0.68358
published_at 2026-04-07T12:55:00Z
4
value 0.00564
scoring_system epss
scoring_elements 0.68409
published_at 2026-04-08T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-09T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68453
published_at 2026-04-11T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68441
published_at 2026-04-12T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-13T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68446
published_at 2026-04-16T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68459
published_at 2026-04-18T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68437
published_at 2026-04-21T12:55:00Z
12
value 0.00564
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-24T12:55:00Z
13
value 0.00564
scoring_system epss
scoring_elements 0.6849
published_at 2026-04-26T12:55:00Z
14
value 0.00564
scoring_system epss
scoring_elements 0.68496
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1032207
reference_id 1032207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1032207
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2013:1802
reference_id RHSA-2013:1802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1802
6
reference_url https://access.redhat.com/errata/RHSA-2014:0163
reference_id RHSA-2014:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0163
7
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
8
reference_url https://usn.ubuntu.com/2109-1/
reference_id USN-2109-1
reference_type
scores
url https://usn.ubuntu.com/2109-1/
9
reference_url https://usn.ubuntu.com/2110-1/
reference_id USN-2110-1
reference_type
scores
url https://usn.ubuntu.com/2110-1/
10
reference_url https://usn.ubuntu.com/2113-1/
reference_id USN-2113-1
reference_type
scores
url https://usn.ubuntu.com/2113-1/
11
reference_url https://usn.ubuntu.com/2117-1/
reference_id USN-2117-1
reference_type
scores
url https://usn.ubuntu.com/2117-1/
12
reference_url https://usn.ubuntu.com/2128-1/
reference_id USN-2128-1
reference_type
scores
url https://usn.ubuntu.com/2128-1/
13
reference_url https://usn.ubuntu.com/2129-1/
reference_id USN-2129-1
reference_type
scores
url https://usn.ubuntu.com/2129-1/
14
reference_url https://usn.ubuntu.com/2135-1/
reference_id USN-2135-1
reference_type
scores
url https://usn.ubuntu.com/2135-1/
15
reference_url https://usn.ubuntu.com/2136-1/
reference_id USN-2136-1
reference_type
scores
url https://usn.ubuntu.com/2136-1/
16
reference_url https://usn.ubuntu.com/2138-1/
reference_id USN-2138-1
reference_type
scores
url https://usn.ubuntu.com/2138-1/
17
reference_url https://usn.ubuntu.com/2139-1/
reference_id USN-2139-1
reference_type
scores
url https://usn.ubuntu.com/2139-1/
18
reference_url https://usn.ubuntu.com/2141-1/
reference_id USN-2141-1
reference_type
scores
url https://usn.ubuntu.com/2141-1/
fixed_packages
aliases CVE-2013-6367
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6eag-zuz2-2bce
2
url VCID-9hv4-pxhr-9fh7
vulnerability_id VCID-9hv4-pxhr-9fh7
summary kvm: cross page vapic_addr access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6368
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12138
published_at 2026-04-01T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12254
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12299
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12179
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.1223
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12238
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12201
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12165
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12152
published_at 2026-04-21T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12128
published_at 2026-04-24T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12094
published_at 2026-04-26T12:55:00Z
14
value 0.0004
scoring_system epss
scoring_elements 0.11994
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1032210
reference_id 1032210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1032210
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2014:0163
reference_id RHSA-2014:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0163
6
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
7
reference_url https://usn.ubuntu.com/2113-1/
reference_id USN-2113-1
reference_type
scores
url https://usn.ubuntu.com/2113-1/
8
reference_url https://usn.ubuntu.com/2117-1/
reference_id USN-2117-1
reference_type
scores
url https://usn.ubuntu.com/2117-1/
9
reference_url https://usn.ubuntu.com/2133-1/
reference_id USN-2133-1
reference_type
scores
url https://usn.ubuntu.com/2133-1/
10
reference_url https://usn.ubuntu.com/2134-1/
reference_id USN-2134-1
reference_type
scores
url https://usn.ubuntu.com/2134-1/
11
reference_url https://usn.ubuntu.com/2135-1/
reference_id USN-2135-1
reference_type
scores
url https://usn.ubuntu.com/2135-1/
12
reference_url https://usn.ubuntu.com/2136-1/
reference_id USN-2136-1
reference_type
scores
url https://usn.ubuntu.com/2136-1/
13
reference_url https://usn.ubuntu.com/2138-1/
reference_id USN-2138-1
reference_type
scores
url https://usn.ubuntu.com/2138-1/
14
reference_url https://usn.ubuntu.com/2139-1/
reference_id USN-2139-1
reference_type
scores
url https://usn.ubuntu.com/2139-1/
15
reference_url https://usn.ubuntu.com/2141-1/
reference_id USN-2141-1
reference_type
scores
url https://usn.ubuntu.com/2141-1/
fixed_packages
aliases CVE-2013-6368
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hv4-pxhr-9fh7
3
url VCID-zhky-hx2q-fyba
vulnerability_id VCID-zhky-hx2q-fyba
summary Kernel: net: memory corruption with UDP_CORK and UFO
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4470.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4470
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31292
published_at 2026-04-01T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.3143
published_at 2026-04-02T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31473
published_at 2026-04-04T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31291
published_at 2026-04-07T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31344
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31375
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31379
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31335
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31297
published_at 2026-04-13T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31331
published_at 2026-04-16T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31311
published_at 2026-04-18T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31284
published_at 2026-04-21T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.31113
published_at 2026-04-24T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.30992
published_at 2026-04-26T12:55:00Z
14
value 0.00122
scoring_system epss
scoring_elements 0.30909
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023477
reference_id 1023477
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023477
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2014:0100
reference_id RHSA-2014:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0100
6
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
7
reference_url https://usn.ubuntu.com/2040-1/
reference_id USN-2040-1
reference_type
scores
url https://usn.ubuntu.com/2040-1/
8
reference_url https://usn.ubuntu.com/2042-1/
reference_id USN-2042-1
reference_type
scores
url https://usn.ubuntu.com/2042-1/
9
reference_url https://usn.ubuntu.com/2043-1/
reference_id USN-2043-1
reference_type
scores
url https://usn.ubuntu.com/2043-1/
10
reference_url https://usn.ubuntu.com/2044-1/
reference_id USN-2044-1
reference_type
scores
url https://usn.ubuntu.com/2044-1/
11
reference_url https://usn.ubuntu.com/2046-1/
reference_id USN-2046-1
reference_type
scores
url https://usn.ubuntu.com/2046-1/
12
reference_url https://usn.ubuntu.com/2049-1/
reference_id USN-2049-1
reference_type
scores
url https://usn.ubuntu.com/2049-1/
13
reference_url https://usn.ubuntu.com/2050-1/
reference_id USN-2050-1
reference_type
scores
url https://usn.ubuntu.com/2050-1/
14
reference_url https://usn.ubuntu.com/2066-1/
reference_id USN-2066-1
reference_type
scores
url https://usn.ubuntu.com/2066-1/
15
reference_url https://usn.ubuntu.com/2067-1/
reference_id USN-2067-1
reference_type
scores
url https://usn.ubuntu.com/2067-1/
16
reference_url https://usn.ubuntu.com/2069-1/
reference_id USN-2069-1
reference_type
scores
url https://usn.ubuntu.com/2069-1/
17
reference_url https://usn.ubuntu.com/2073-1/
reference_id USN-2073-1
reference_type
scores
url https://usn.ubuntu.com/2073-1/
18
reference_url https://usn.ubuntu.com/2233-1/
reference_id USN-2233-1
reference_type
scores
url https://usn.ubuntu.com/2233-1/
19
reference_url https://usn.ubuntu.com/2234-1/
reference_id USN-2234-1
reference_type
scores
url https://usn.ubuntu.com/2234-1/
fixed_packages
aliases CVE-2013-4470
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhky-hx2q-fyba
Fixing_vulnerabilities
Risk_score0.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-431.1.2%3Farch=el6