Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-279.9.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-279.9.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1mhp-87fh-mkc1
vulnerability_id VCID-1mhp-87fh-mkc1
summary kernel: huge pages: memory leak on mmap failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2390.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2390
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17844
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17797
published_at 2026-04-16T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17806
published_at 2026-04-18T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18084
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17785
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17873
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17933
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17949
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17904
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17855
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22521
published_at 2026-04-02T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22354
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=824345
reference_id 824345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=824345
4
reference_url https://access.redhat.com/errata/RHSA-2012:1150
reference_id RHSA-2012:1150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1150
5
reference_url https://access.redhat.com/errata/RHSA-2012:1304
reference_id RHSA-2012:1304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1304
6
reference_url https://usn.ubuntu.com/1508-1/
reference_id USN-1508-1
reference_type
scores
url https://usn.ubuntu.com/1508-1/
7
reference_url https://usn.ubuntu.com/1515-1/
reference_id USN-1515-1
reference_type
scores
url https://usn.ubuntu.com/1515-1/
8
reference_url https://usn.ubuntu.com/1531-1/
reference_id USN-1531-1
reference_type
scores
url https://usn.ubuntu.com/1531-1/
9
reference_url https://usn.ubuntu.com/1533-1/
reference_id USN-1533-1
reference_type
scores
url https://usn.ubuntu.com/1533-1/
10
reference_url https://usn.ubuntu.com/1534-1/
reference_id USN-1534-1
reference_type
scores
url https://usn.ubuntu.com/1534-1/
11
reference_url https://usn.ubuntu.com/1535-1/
reference_id USN-1535-1
reference_type
scores
url https://usn.ubuntu.com/1535-1/
12
reference_url https://usn.ubuntu.com/1538-1/
reference_id USN-1538-1
reference_type
scores
url https://usn.ubuntu.com/1538-1/
13
reference_url https://usn.ubuntu.com/1539-1/
reference_id USN-1539-1
reference_type
scores
url https://usn.ubuntu.com/1539-1/
fixed_packages
aliases CVE-2012-2390
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mhp-87fh-mkc1
1
url VCID-3b63-awen-vfeb
vulnerability_id VCID-3b63-awen-vfeb
summary kernel: unfiltered netdev rio_ioctl access by users
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2313.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2313
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42169
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42256
published_at 2026-04-09T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42198
published_at 2026-04-07T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42248
published_at 2026-04-08T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42279
published_at 2026-04-11T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42243
published_at 2026-04-12T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42214
published_at 2026-04-13T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42265
published_at 2026-04-16T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.4224
published_at 2026-04-18T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42173
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818820
reference_id 818820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818820
4
reference_url https://access.redhat.com/errata/RHSA-2012:1174
reference_id RHSA-2012:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1174
5
reference_url https://access.redhat.com/errata/RHSA-2012:1282
reference_id RHSA-2012:1282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1282
6
reference_url https://access.redhat.com/errata/RHSA-2012:1304
reference_id RHSA-2012:1304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1304
7
reference_url https://access.redhat.com/errata/RHSA-2012:1481
reference_id RHSA-2012:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1481
8
reference_url https://access.redhat.com/errata/RHSA-2012:1541
reference_id RHSA-2012:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1541
9
reference_url https://access.redhat.com/errata/RHSA-2012:1589
reference_id RHSA-2012:1589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1589
10
reference_url https://usn.ubuntu.com/1471-1/
reference_id USN-1471-1
reference_type
scores
url https://usn.ubuntu.com/1471-1/
11
reference_url https://usn.ubuntu.com/1472-1/
reference_id USN-1472-1
reference_type
scores
url https://usn.ubuntu.com/1472-1/
12
reference_url https://usn.ubuntu.com/1473-1/
reference_id USN-1473-1
reference_type
scores
url https://usn.ubuntu.com/1473-1/
13
reference_url https://usn.ubuntu.com/1474-1/
reference_id USN-1474-1
reference_type
scores
url https://usn.ubuntu.com/1474-1/
14
reference_url https://usn.ubuntu.com/1476-1/
reference_id USN-1476-1
reference_type
scores
url https://usn.ubuntu.com/1476-1/
15
reference_url https://usn.ubuntu.com/1488-1/
reference_id USN-1488-1
reference_type
scores
url https://usn.ubuntu.com/1488-1/
16
reference_url https://usn.ubuntu.com/1490-1/
reference_id USN-1490-1
reference_type
scores
url https://usn.ubuntu.com/1490-1/
17
reference_url https://usn.ubuntu.com/1491-1/
reference_id USN-1491-1
reference_type
scores
url https://usn.ubuntu.com/1491-1/
18
reference_url https://usn.ubuntu.com/1492-1/
reference_id USN-1492-1
reference_type
scores
url https://usn.ubuntu.com/1492-1/
19
reference_url https://usn.ubuntu.com/1493-1/
reference_id USN-1493-1
reference_type
scores
url https://usn.ubuntu.com/1493-1/
20
reference_url https://usn.ubuntu.com/1530-1/
reference_id USN-1530-1
reference_type
scores
url https://usn.ubuntu.com/1530-1/
fixed_packages
aliases CVE-2012-2313
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b63-awen-vfeb
2
url VCID-49m9-z9q9-13bm
vulnerability_id VCID-49m9-z9q9-13bm
summary kernel: recv{from,msg}() on an rds socket can leak kernel memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1323.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1323.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3430.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3430.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3430
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39251
published_at 2026-04-21T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39164
published_at 2026-04-01T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39351
published_at 2026-04-02T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-04T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39288
published_at 2026-04-07T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39343
published_at 2026-04-08T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.3936
published_at 2026-04-09T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39372
published_at 2026-04-11T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39332
published_at 2026-04-12T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39314
published_at 2026-04-13T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-16T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.39338
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3430
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430
5
reference_url http://secunia.com/advisories/50633
reference_id
reference_type
scores
url http://secunia.com/advisories/50633
6
reference_url http://secunia.com/advisories/50732
reference_id
reference_type
scores
url http://secunia.com/advisories/50732
7
reference_url http://secunia.com/advisories/50811
reference_id
reference_type
scores
url http://secunia.com/advisories/50811
8
reference_url https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7
9
reference_url https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
10
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44
11
reference_url http://www.openwall.com/lists/oss-security/2012/07/26/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/26/5
12
reference_url http://www.ubuntu.com/usn/USN-1567-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1567-1
13
reference_url http://www.ubuntu.com/usn/USN-1568-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1568-1
14
reference_url http://www.ubuntu.com/usn/USN-1572-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1572-1
15
reference_url http://www.ubuntu.com/usn/USN-1575-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1575-1
16
reference_url http://www.ubuntu.com/usn/USN-1577-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1577-1
17
reference_url http://www.ubuntu.com/usn/USN-1578-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1578-1
18
reference_url http://www.ubuntu.com/usn/USN-1579-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1579-1
19
reference_url http://www.ubuntu.com/usn/USN-1580-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1580-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=820039
reference_id 820039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=820039
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3430
reference_id CVE-2012-3430
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3430
65
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37543.c
reference_id CVE-2012-3430;OSVDB-85606
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37543.c
66
reference_url https://www.securityfocus.com/bid/54702/info
reference_id CVE-2012-3430;OSVDB-85606
reference_type exploit
scores
url https://www.securityfocus.com/bid/54702/info
67
reference_url https://access.redhat.com/errata/RHSA-2012:1304
reference_id RHSA-2012:1304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1304
68
reference_url https://access.redhat.com/errata/RHSA-2012:1323
reference_id RHSA-2012:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1323
69
reference_url https://access.redhat.com/errata/RHSA-2012:1491
reference_id RHSA-2012:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1491
70
reference_url https://usn.ubuntu.com/1567-1/
reference_id USN-1567-1
reference_type
scores
url https://usn.ubuntu.com/1567-1/
71
reference_url https://usn.ubuntu.com/1568-1/
reference_id USN-1568-1
reference_type
scores
url https://usn.ubuntu.com/1568-1/
72
reference_url https://usn.ubuntu.com/1572-1/
reference_id USN-1572-1
reference_type
scores
url https://usn.ubuntu.com/1572-1/
73
reference_url https://usn.ubuntu.com/1573-1/
reference_id USN-1573-1
reference_type
scores
url https://usn.ubuntu.com/1573-1/
74
reference_url https://usn.ubuntu.com/1574-1/
reference_id USN-1574-1
reference_type
scores
url https://usn.ubuntu.com/1574-1/
75
reference_url https://usn.ubuntu.com/1575-1/
reference_id USN-1575-1
reference_type
scores
url https://usn.ubuntu.com/1575-1/
76
reference_url https://usn.ubuntu.com/1577-1/
reference_id USN-1577-1
reference_type
scores
url https://usn.ubuntu.com/1577-1/
77
reference_url https://usn.ubuntu.com/1578-1/
reference_id USN-1578-1
reference_type
scores
url https://usn.ubuntu.com/1578-1/
78
reference_url https://usn.ubuntu.com/1579-1/
reference_id USN-1579-1
reference_type
scores
url https://usn.ubuntu.com/1579-1/
79
reference_url https://usn.ubuntu.com/1580-1/
reference_id USN-1580-1
reference_type
scores
url https://usn.ubuntu.com/1580-1/
fixed_packages
aliases CVE-2012-3430
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49m9-z9q9-13bm
3
url VCID-b5gh-4yau-tycv
vulnerability_id VCID-b5gh-4yau-tycv
summary kernel: drm/i915: integer overflow in i915_gem_do_execbuffer()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2384
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20031
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20178
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19962
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.201
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20118
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20073
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20015
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19997
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20001
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2384
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=824178
reference_id 824178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=824178
3
reference_url https://access.redhat.com/errata/RHSA-2012:1304
reference_id RHSA-2012:1304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1304
4
reference_url https://usn.ubuntu.com/1471-1/
reference_id USN-1471-1
reference_type
scores
url https://usn.ubuntu.com/1471-1/
5
reference_url https://usn.ubuntu.com/1472-1/
reference_id USN-1472-1
reference_type
scores
url https://usn.ubuntu.com/1472-1/
6
reference_url https://usn.ubuntu.com/1473-1/
reference_id USN-1473-1
reference_type
scores
url https://usn.ubuntu.com/1473-1/
7
reference_url https://usn.ubuntu.com/1474-1/
reference_id USN-1474-1
reference_type
scores
url https://usn.ubuntu.com/1474-1/
8
reference_url https://usn.ubuntu.com/1476-1/
reference_id USN-1476-1
reference_type
scores
url https://usn.ubuntu.com/1476-1/
fixed_packages
aliases CVE-2012-2384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5gh-4yau-tycv
4
url VCID-qutd-u7hs-m7a5
vulnerability_id VCID-qutd-u7hs-m7a5
summary kernel: net: slab corruption due to improper synchronization around inet->opt
references
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3552.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3552
reference_id
reference_type
scores
0
value 0.02031
scoring_system epss
scoring_elements 0.83835
published_at 2026-04-21T12:55:00Z
1
value 0.02031
scoring_system epss
scoring_elements 0.83834
published_at 2026-04-18T12:55:00Z
2
value 0.02031
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-01T12:55:00Z
3
value 0.02031
scoring_system epss
scoring_elements 0.83747
published_at 2026-04-02T12:55:00Z
4
value 0.02031
scoring_system epss
scoring_elements 0.83762
published_at 2026-04-04T12:55:00Z
5
value 0.02031
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-07T12:55:00Z
6
value 0.02031
scoring_system epss
scoring_elements 0.83789
published_at 2026-04-08T12:55:00Z
7
value 0.02031
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-09T12:55:00Z
8
value 0.02031
scoring_system epss
scoring_elements 0.83811
published_at 2026-04-11T12:55:00Z
9
value 0.02031
scoring_system epss
scoring_elements 0.83805
published_at 2026-04-12T12:55:00Z
10
value 0.02031
scoring_system epss
scoring_elements 0.838
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3552
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552
6
reference_url https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259
7
reference_url http://www.openwall.com/lists/oss-security/2012/08/31/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/31/11
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=853465
reference_id 853465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=853465
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3552
reference_id CVE-2012-3552
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2012-3552
12
reference_url https://access.redhat.com/errata/RHSA-2012:1304
reference_id RHSA-2012:1304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1304
13
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
fixed_packages
aliases CVE-2012-3552
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qutd-u7hs-m7a5
Fixing_vulnerabilities
Risk_score3.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-279.9.1%3Farch=el6