Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-358.37.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-358.37.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6eag-zuz2-2bce
vulnerability_id VCID-6eag-zuz2-2bce
summary kvm: division by zero in apic_get_tmcct()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6367.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6367
reference_id
reference_type
scores
0
value 0.00564
scoring_system epss
scoring_elements 0.68342
published_at 2026-04-01T12:55:00Z
1
value 0.00564
scoring_system epss
scoring_elements 0.68362
published_at 2026-04-02T12:55:00Z
2
value 0.00564
scoring_system epss
scoring_elements 0.68382
published_at 2026-04-04T12:55:00Z
3
value 0.00564
scoring_system epss
scoring_elements 0.68358
published_at 2026-04-07T12:55:00Z
4
value 0.00564
scoring_system epss
scoring_elements 0.68409
published_at 2026-04-08T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-09T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68453
published_at 2026-04-11T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68441
published_at 2026-04-12T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-13T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68446
published_at 2026-04-16T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68459
published_at 2026-04-18T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68437
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1032207
reference_id 1032207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1032207
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2013:1802
reference_id RHSA-2013:1802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1802
6
reference_url https://access.redhat.com/errata/RHSA-2014:0163
reference_id RHSA-2014:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0163
7
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
8
reference_url https://usn.ubuntu.com/2109-1/
reference_id USN-2109-1
reference_type
scores
url https://usn.ubuntu.com/2109-1/
9
reference_url https://usn.ubuntu.com/2110-1/
reference_id USN-2110-1
reference_type
scores
url https://usn.ubuntu.com/2110-1/
10
reference_url https://usn.ubuntu.com/2113-1/
reference_id USN-2113-1
reference_type
scores
url https://usn.ubuntu.com/2113-1/
11
reference_url https://usn.ubuntu.com/2117-1/
reference_id USN-2117-1
reference_type
scores
url https://usn.ubuntu.com/2117-1/
12
reference_url https://usn.ubuntu.com/2128-1/
reference_id USN-2128-1
reference_type
scores
url https://usn.ubuntu.com/2128-1/
13
reference_url https://usn.ubuntu.com/2129-1/
reference_id USN-2129-1
reference_type
scores
url https://usn.ubuntu.com/2129-1/
14
reference_url https://usn.ubuntu.com/2135-1/
reference_id USN-2135-1
reference_type
scores
url https://usn.ubuntu.com/2135-1/
15
reference_url https://usn.ubuntu.com/2136-1/
reference_id USN-2136-1
reference_type
scores
url https://usn.ubuntu.com/2136-1/
16
reference_url https://usn.ubuntu.com/2138-1/
reference_id USN-2138-1
reference_type
scores
url https://usn.ubuntu.com/2138-1/
17
reference_url https://usn.ubuntu.com/2139-1/
reference_id USN-2139-1
reference_type
scores
url https://usn.ubuntu.com/2139-1/
18
reference_url https://usn.ubuntu.com/2141-1/
reference_id USN-2141-1
reference_type
scores
url https://usn.ubuntu.com/2141-1/
fixed_packages
aliases CVE-2013-6367
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6eag-zuz2-2bce
1
url VCID-9hv4-pxhr-9fh7
vulnerability_id VCID-9hv4-pxhr-9fh7
summary kvm: cross page vapic_addr access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6368
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12138
published_at 2026-04-01T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12254
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12299
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12179
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.1223
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12238
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12201
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12165
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1032210
reference_id 1032210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1032210
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2014:0163
reference_id RHSA-2014:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0163
6
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
7
reference_url https://usn.ubuntu.com/2113-1/
reference_id USN-2113-1
reference_type
scores
url https://usn.ubuntu.com/2113-1/
8
reference_url https://usn.ubuntu.com/2117-1/
reference_id USN-2117-1
reference_type
scores
url https://usn.ubuntu.com/2117-1/
9
reference_url https://usn.ubuntu.com/2133-1/
reference_id USN-2133-1
reference_type
scores
url https://usn.ubuntu.com/2133-1/
10
reference_url https://usn.ubuntu.com/2134-1/
reference_id USN-2134-1
reference_type
scores
url https://usn.ubuntu.com/2134-1/
11
reference_url https://usn.ubuntu.com/2135-1/
reference_id USN-2135-1
reference_type
scores
url https://usn.ubuntu.com/2135-1/
12
reference_url https://usn.ubuntu.com/2136-1/
reference_id USN-2136-1
reference_type
scores
url https://usn.ubuntu.com/2136-1/
13
reference_url https://usn.ubuntu.com/2138-1/
reference_id USN-2138-1
reference_type
scores
url https://usn.ubuntu.com/2138-1/
14
reference_url https://usn.ubuntu.com/2139-1/
reference_id USN-2139-1
reference_type
scores
url https://usn.ubuntu.com/2139-1/
15
reference_url https://usn.ubuntu.com/2141-1/
reference_id USN-2141-1
reference_type
scores
url https://usn.ubuntu.com/2141-1/
fixed_packages
aliases CVE-2013-6368
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hv4-pxhr-9fh7
2
url VCID-kzp7-xnk7-gqct
vulnerability_id VCID-kzp7-xnk7-gqct
summary several
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
3
reference_url http://marc.info/?l=linux-kernel&m=137055204522556&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-kernel&m=137055204522556&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1645.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1645.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1783.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1783.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-0284.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0284.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2851.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2851.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2851
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.1449
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14584
published_at 2026-04-12T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14633
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14703
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14516
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14605
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14662
published_at 2026-04-09T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14523
published_at 2026-04-13T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14414
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14417
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2851
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1059
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163
19
reference_url http://www.debian.org/security/2013/dsa-2766
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2766
20
reference_url http://www.openwall.com/lists/oss-security/2013/06/06/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/06/06/13
21
reference_url http://www.ubuntu.com/usn/USN-1912-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1912-1
22
reference_url http://www.ubuntu.com/usn/USN-1913-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1913-1
23
reference_url http://www.ubuntu.com/usn/USN-1941-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1941-1
24
reference_url http://www.ubuntu.com/usn/USN-1942-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1942-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=969515
reference_id 969515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=969515
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2851
reference_id CVE-2013-2851
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-2851
39
reference_url https://access.redhat.com/errata/RHSA-2013:1264
reference_id RHSA-2013:1264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1264
40
reference_url https://access.redhat.com/errata/RHSA-2013:1645
reference_id RHSA-2013:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1645
41
reference_url https://access.redhat.com/errata/RHSA-2013:1783
reference_id RHSA-2013:1783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1783
42
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
43
reference_url https://usn.ubuntu.com/1912-1/
reference_id USN-1912-1
reference_type
scores
url https://usn.ubuntu.com/1912-1/
44
reference_url https://usn.ubuntu.com/1913-1/
reference_id USN-1913-1
reference_type
scores
url https://usn.ubuntu.com/1913-1/
45
reference_url https://usn.ubuntu.com/1931-1/
reference_id USN-1931-1
reference_type
scores
url https://usn.ubuntu.com/1931-1/
46
reference_url https://usn.ubuntu.com/1932-1/
reference_id USN-1932-1
reference_type
scores
url https://usn.ubuntu.com/1932-1/
47
reference_url https://usn.ubuntu.com/1933-1/
reference_id USN-1933-1
reference_type
scores
url https://usn.ubuntu.com/1933-1/
48
reference_url https://usn.ubuntu.com/1934-1/
reference_id USN-1934-1
reference_type
scores
url https://usn.ubuntu.com/1934-1/
49
reference_url https://usn.ubuntu.com/1935-1/
reference_id USN-1935-1
reference_type
scores
url https://usn.ubuntu.com/1935-1/
50
reference_url https://usn.ubuntu.com/1936-1/
reference_id USN-1936-1
reference_type
scores
url https://usn.ubuntu.com/1936-1/
51
reference_url https://usn.ubuntu.com/1941-1/
reference_id USN-1941-1
reference_type
scores
url https://usn.ubuntu.com/1941-1/
52
reference_url https://usn.ubuntu.com/1942-1/
reference_id USN-1942-1
reference_type
scores
url https://usn.ubuntu.com/1942-1/
fixed_packages
aliases CVE-2013-2851
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzp7-xnk7-gqct
3
url VCID-p5v7-c1x2-u3gj
vulnerability_id VCID-p5v7-c1x2-u3gj
summary Kernel: net: IPv6: panic when UFO=On for an interface
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4387.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4387
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.69958
published_at 2026-04-01T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.69971
published_at 2026-04-02T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.69985
published_at 2026-04-04T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.69962
published_at 2026-04-07T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.70009
published_at 2026-04-08T12:55:00Z
5
value 0.0062
scoring_system epss
scoring_elements 0.70026
published_at 2026-04-09T12:55:00Z
6
value 0.0062
scoring_system epss
scoring_elements 0.70049
published_at 2026-04-11T12:55:00Z
7
value 0.0062
scoring_system epss
scoring_elements 0.70034
published_at 2026-04-12T12:55:00Z
8
value 0.0062
scoring_system epss
scoring_elements 0.70021
published_at 2026-04-13T12:55:00Z
9
value 0.0062
scoring_system epss
scoring_elements 0.70064
published_at 2026-04-16T12:55:00Z
10
value 0.0062
scoring_system epss
scoring_elements 0.70073
published_at 2026-04-18T12:55:00Z
11
value 0.0062
scoring_system epss
scoring_elements 0.70054
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1011927
reference_id 1011927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1011927
4
reference_url https://access.redhat.com/errata/RHSA-2013:1490
reference_id RHSA-2013:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1490
5
reference_url https://access.redhat.com/errata/RHSA-2013:1645
reference_id RHSA-2013:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1645
6
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
7
reference_url https://usn.ubuntu.com/2019-1/
reference_id USN-2019-1
reference_type
scores
url https://usn.ubuntu.com/2019-1/
8
reference_url https://usn.ubuntu.com/2021-1/
reference_id USN-2021-1
reference_type
scores
url https://usn.ubuntu.com/2021-1/
9
reference_url https://usn.ubuntu.com/2022-1/
reference_id USN-2022-1
reference_type
scores
url https://usn.ubuntu.com/2022-1/
10
reference_url https://usn.ubuntu.com/2024-1/
reference_id USN-2024-1
reference_type
scores
url https://usn.ubuntu.com/2024-1/
11
reference_url https://usn.ubuntu.com/2038-1/
reference_id USN-2038-1
reference_type
scores
url https://usn.ubuntu.com/2038-1/
12
reference_url https://usn.ubuntu.com/2039-1/
reference_id USN-2039-1
reference_type
scores
url https://usn.ubuntu.com/2039-1/
13
reference_url https://usn.ubuntu.com/2041-1/
reference_id USN-2041-1
reference_type
scores
url https://usn.ubuntu.com/2041-1/
14
reference_url https://usn.ubuntu.com/2045-1/
reference_id USN-2045-1
reference_type
scores
url https://usn.ubuntu.com/2045-1/
15
reference_url https://usn.ubuntu.com/2049-1/
reference_id USN-2049-1
reference_type
scores
url https://usn.ubuntu.com/2049-1/
16
reference_url https://usn.ubuntu.com/2050-1/
reference_id USN-2050-1
reference_type
scores
url https://usn.ubuntu.com/2050-1/
17
reference_url https://usn.ubuntu.com/2233-1/
reference_id USN-2233-1
reference_type
scores
url https://usn.ubuntu.com/2233-1/
18
reference_url https://usn.ubuntu.com/2234-1/
reference_id USN-2234-1
reference_type
scores
url https://usn.ubuntu.com/2234-1/
fixed_packages
aliases CVE-2013-4387
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5v7-c1x2-u3gj
4
url VCID-xrqy-1hju-ykcv
vulnerability_id VCID-xrqy-1hju-ykcv
summary Kernel: qeth: buffer overflow in snmp ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6381.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6381
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26314
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26354
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26394
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26165
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26233
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26281
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26288
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26243
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26188
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26163
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26125
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1033600
reference_id 1033600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1033600
4
reference_url https://access.redhat.com/errata/RHSA-2014:0159
reference_id RHSA-2014:0159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0159
5
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
6
reference_url https://access.redhat.com/errata/RHSA-2014:0285
reference_id RHSA-2014:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0285
7
reference_url https://access.redhat.com/errata/RHSA-2014:0476
reference_id RHSA-2014:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0476
fixed_packages
aliases CVE-2013-6381
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrqy-1hju-ykcv
5
url VCID-z5vn-2rg2-8fh5
vulnerability_id VCID-z5vn-2rg2-8fh5
summary kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4591.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4591
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14777
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14827
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14905
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14707
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14797
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14857
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14815
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14778
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14721
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14615
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14623
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14685
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4591
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1031678
reference_id 1031678
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1031678
4
reference_url https://access.redhat.com/errata/RHSA-2013:1645
reference_id RHSA-2013:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1645
5
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
fixed_packages
aliases CVE-2013-4591
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5vn-2rg2-8fh5
6
url VCID-zhky-hx2q-fyba
vulnerability_id VCID-zhky-hx2q-fyba
summary Kernel: net: memory corruption with UDP_CORK and UFO
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4470.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4470
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31292
published_at 2026-04-01T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.3143
published_at 2026-04-02T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31473
published_at 2026-04-04T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31291
published_at 2026-04-07T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31344
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31375
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31379
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31335
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31297
published_at 2026-04-13T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31331
published_at 2026-04-16T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31311
published_at 2026-04-18T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31284
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1023477
reference_id 1023477
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1023477
4
reference_url https://access.redhat.com/errata/RHSA-2013:1801
reference_id RHSA-2013:1801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1801
5
reference_url https://access.redhat.com/errata/RHSA-2014:0100
reference_id RHSA-2014:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0100
6
reference_url https://access.redhat.com/errata/RHSA-2014:0284
reference_id RHSA-2014:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0284
7
reference_url https://usn.ubuntu.com/2040-1/
reference_id USN-2040-1
reference_type
scores
url https://usn.ubuntu.com/2040-1/
8
reference_url https://usn.ubuntu.com/2042-1/
reference_id USN-2042-1
reference_type
scores
url https://usn.ubuntu.com/2042-1/
9
reference_url https://usn.ubuntu.com/2043-1/
reference_id USN-2043-1
reference_type
scores
url https://usn.ubuntu.com/2043-1/
10
reference_url https://usn.ubuntu.com/2044-1/
reference_id USN-2044-1
reference_type
scores
url https://usn.ubuntu.com/2044-1/
11
reference_url https://usn.ubuntu.com/2046-1/
reference_id USN-2046-1
reference_type
scores
url https://usn.ubuntu.com/2046-1/
12
reference_url https://usn.ubuntu.com/2049-1/
reference_id USN-2049-1
reference_type
scores
url https://usn.ubuntu.com/2049-1/
13
reference_url https://usn.ubuntu.com/2050-1/
reference_id USN-2050-1
reference_type
scores
url https://usn.ubuntu.com/2050-1/
14
reference_url https://usn.ubuntu.com/2066-1/
reference_id USN-2066-1
reference_type
scores
url https://usn.ubuntu.com/2066-1/
15
reference_url https://usn.ubuntu.com/2067-1/
reference_id USN-2067-1
reference_type
scores
url https://usn.ubuntu.com/2067-1/
16
reference_url https://usn.ubuntu.com/2069-1/
reference_id USN-2069-1
reference_type
scores
url https://usn.ubuntu.com/2069-1/
17
reference_url https://usn.ubuntu.com/2073-1/
reference_id USN-2073-1
reference_type
scores
url https://usn.ubuntu.com/2073-1/
18
reference_url https://usn.ubuntu.com/2233-1/
reference_id USN-2233-1
reference_type
scores
url https://usn.ubuntu.com/2233-1/
19
reference_url https://usn.ubuntu.com/2234-1/
reference_id USN-2234-1
reference_type
scores
url https://usn.ubuntu.com/2234-1/
fixed_packages
aliases CVE-2013-4470
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhky-hx2q-fyba
Fixing_vulnerabilities
Risk_score2.7
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-358.37.1%3Farch=el6