Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-220.23.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-220.23.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-486y-9v9t-x3hx
vulnerability_id VCID-486y-9v9t-x3hx
summary kernel: net: insufficient data_len validation in sock_alloc_send_pskb()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2136
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23212
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23391
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23432
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.2329
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.2334
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23361
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23323
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23266
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23283
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23069
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2136
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816289
reference_id 816289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=816289
4
reference_url https://access.redhat.com/errata/RHSA-2012:0690
reference_id RHSA-2012:0690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0690
5
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
6
reference_url https://access.redhat.com/errata/RHSA-2012:1087
reference_id RHSA-2012:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1087
7
reference_url https://usn.ubuntu.com/1514-1/
reference_id USN-1514-1
reference_type
scores
url https://usn.ubuntu.com/1514-1/
8
reference_url https://usn.ubuntu.com/1529-1/
reference_id USN-1529-1
reference_type
scores
url https://usn.ubuntu.com/1529-1/
9
reference_url https://usn.ubuntu.com/1530-1/
reference_id USN-1530-1
reference_type
scores
url https://usn.ubuntu.com/1530-1/
10
reference_url https://usn.ubuntu.com/1531-1/
reference_id USN-1531-1
reference_type
scores
url https://usn.ubuntu.com/1531-1/
11
reference_url https://usn.ubuntu.com/1532-1/
reference_id USN-1532-1
reference_type
scores
url https://usn.ubuntu.com/1532-1/
12
reference_url https://usn.ubuntu.com/1533-1/
reference_id USN-1533-1
reference_type
scores
url https://usn.ubuntu.com/1533-1/
13
reference_url https://usn.ubuntu.com/1534-1/
reference_id USN-1534-1
reference_type
scores
url https://usn.ubuntu.com/1534-1/
14
reference_url https://usn.ubuntu.com/1535-1/
reference_id USN-1535-1
reference_type
scores
url https://usn.ubuntu.com/1535-1/
15
reference_url https://usn.ubuntu.com/1538-1/
reference_id USN-1538-1
reference_type
scores
url https://usn.ubuntu.com/1538-1/
16
reference_url https://usn.ubuntu.com/1539-1/
reference_id USN-1539-1
reference_type
scores
url https://usn.ubuntu.com/1539-1/
17
reference_url https://usn.ubuntu.com/1598-1/
reference_id USN-1598-1
reference_type
scores
url https://usn.ubuntu.com/1598-1/
fixed_packages
aliases CVE-2012-2136
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-486y-9v9t-x3hx
1
url VCID-aszd-q4dg-bbgw
vulnerability_id VCID-aszd-q4dg-bbgw
summary kernel: macvtap: zerocopy: vector length is not validated before pinning user pages
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
3
reference_url http://marc.info/?l=linux-netdev&m=133455718001608&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=133455718001608&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-0743.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-0743.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2119.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2119.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2119
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56506
published_at 2026-04-24T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56453
published_at 2026-04-01T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.5655
published_at 2026-04-07T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56571
published_at 2026-04-04T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56602
published_at 2026-04-08T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56606
published_at 2026-04-09T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56615
published_at 2026-04-11T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56591
published_at 2026-04-12T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-13T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.566
published_at 2026-04-16T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56599
published_at 2026-04-18T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.5657
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2119
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119
8
reference_url https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73
9
reference_url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73
reference_id
reference_type
scores
url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73
10
reference_url http://ubuntu.com/usn/usn-1529-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1529-1
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5
12
reference_url http://www.openwall.com/lists/oss-security/2012/04/19/14
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/04/19/14
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814278
reference_id 814278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814278
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2119
reference_id CVE-2012-2119
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-2119
20
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
21
reference_url https://usn.ubuntu.com/1514-1/
reference_id USN-1514-1
reference_type
scores
url https://usn.ubuntu.com/1514-1/
22
reference_url https://usn.ubuntu.com/1529-1/
reference_id USN-1529-1
reference_type
scores
url https://usn.ubuntu.com/1529-1/
fixed_packages
aliases CVE-2012-2119
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aszd-q4dg-bbgw
2
url VCID-cae1-x9uv-c3fu
vulnerability_id VCID-cae1-x9uv-c3fu
summary kernel: fcaps: clear the same personality flags as suid when fcaps are used
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2123.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2123
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17856
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18018
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18072
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17772
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.1786
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.1792
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17936
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17892
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17843
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17785
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17794
published_at 2026-04-18T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17832
published_at 2026-04-21T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17739
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2123
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=806722
reference_id 806722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=806722
3
reference_url https://access.redhat.com/errata/RHSA-2012:0670
reference_id RHSA-2012:0670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0670
4
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
5
reference_url https://usn.ubuntu.com/1445-1/
reference_id USN-1445-1
reference_type
scores
url https://usn.ubuntu.com/1445-1/
6
reference_url https://usn.ubuntu.com/1448-1/
reference_id USN-1448-1
reference_type
scores
url https://usn.ubuntu.com/1448-1/
7
reference_url https://usn.ubuntu.com/1452-1/
reference_id USN-1452-1
reference_type
scores
url https://usn.ubuntu.com/1452-1/
8
reference_url https://usn.ubuntu.com/1453-1/
reference_id USN-1453-1
reference_type
scores
url https://usn.ubuntu.com/1453-1/
9
reference_url https://usn.ubuntu.com/1455-1/
reference_id USN-1455-1
reference_type
scores
url https://usn.ubuntu.com/1455-1/
10
reference_url https://usn.ubuntu.com/1457-1/
reference_id USN-1457-1
reference_type
scores
url https://usn.ubuntu.com/1457-1/
11
reference_url https://usn.ubuntu.com/1459-1/
reference_id USN-1459-1
reference_type
scores
url https://usn.ubuntu.com/1459-1/
12
reference_url https://usn.ubuntu.com/1460-1/
reference_id USN-1460-1
reference_type
scores
url https://usn.ubuntu.com/1460-1/
13
reference_url https://usn.ubuntu.com/1470-1/
reference_id USN-1470-1
reference_type
scores
url https://usn.ubuntu.com/1470-1/
14
reference_url https://usn.ubuntu.com/1530-1/
reference_id USN-1530-1
reference_type
scores
url https://usn.ubuntu.com/1530-1/
fixed_packages
aliases CVE-2012-2123
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cae1-x9uv-c3fu
3
url VCID-cz7k-mjp3-g3hn
vulnerability_id VCID-cz7k-mjp3-g3hn
summary kernel: rds-ping cause kernel panic
references
0
reference_url http://marc.info/?l=bugtraq&m=139447903326211&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=139447903326211&w=2
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-0743.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-0743.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2372.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2372
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30164
published_at 2026-04-24T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30388
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30418
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30463
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30271
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30331
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30365
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30368
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30324
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30276
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.3029
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30273
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30229
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2372
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372
6
reference_url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8
reference_id
reference_type
scores
url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8
7
reference_url https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
8
reference_url http://ubuntu.com/usn/usn-1529-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1529-1
9
reference_url http://www.securityfocus.com/bid/54062
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54062
10
reference_url http://www.ubuntu.com/usn/USN-1555-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1555-1
11
reference_url http://www.ubuntu.com/usn/USN-1556-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1556-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=822754
reference_id 822754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=822754
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2372
reference_id CVE-2012-2372
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-2372
19
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
20
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
21
reference_url https://usn.ubuntu.com/1514-1/
reference_id USN-1514-1
reference_type
scores
url https://usn.ubuntu.com/1514-1/
22
reference_url https://usn.ubuntu.com/1529-1/
reference_id USN-1529-1
reference_type
scores
url https://usn.ubuntu.com/1529-1/
23
reference_url https://usn.ubuntu.com/1530-1/
reference_id USN-1530-1
reference_type
scores
url https://usn.ubuntu.com/1530-1/
24
reference_url https://usn.ubuntu.com/1531-1/
reference_id USN-1531-1
reference_type
scores
url https://usn.ubuntu.com/1531-1/
25
reference_url https://usn.ubuntu.com/1538-1/
reference_id USN-1538-1
reference_type
scores
url https://usn.ubuntu.com/1538-1/
26
reference_url https://usn.ubuntu.com/1554-1/
reference_id USN-1554-1
reference_type
scores
url https://usn.ubuntu.com/1554-1/
27
reference_url https://usn.ubuntu.com/1555-1/
reference_id USN-1555-1
reference_type
scores
url https://usn.ubuntu.com/1555-1/
28
reference_url https://usn.ubuntu.com/1556-1/
reference_id USN-1556-1
reference_type
scores
url https://usn.ubuntu.com/1556-1/
29
reference_url https://usn.ubuntu.com/1558-1/
reference_id USN-1558-1
reference_type
scores
url https://usn.ubuntu.com/1558-1/
30
reference_url https://usn.ubuntu.com/1563-1/
reference_id USN-1563-1
reference_type
scores
url https://usn.ubuntu.com/1563-1/
fixed_packages
aliases CVE-2012-2372
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cz7k-mjp3-g3hn
4
url VCID-dzp6-pjj8-ruhf
vulnerability_id VCID-dzp6-pjj8-ruhf
summary kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1179
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57921
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58006
published_at 2026-04-02T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-04T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58004
published_at 2026-04-07T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.58059
published_at 2026-04-08T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58062
published_at 2026-04-09T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58078
published_at 2026-04-11T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58056
published_at 2026-04-12T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58035
published_at 2026-04-13T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58065
published_at 2026-04-18T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-21T12:55:00Z
11
value 0.00358
scoring_system epss
scoring_elements 0.58008
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1179
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=803793
reference_id 803793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=803793
3
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
4
reference_url https://access.redhat.com/errata/RHSA-2012:1042
reference_id RHSA-2012:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1042
5
reference_url https://usn.ubuntu.com/1431-1/
reference_id USN-1431-1
reference_type
scores
url https://usn.ubuntu.com/1431-1/
6
reference_url https://usn.ubuntu.com/1433-1/
reference_id USN-1433-1
reference_type
scores
url https://usn.ubuntu.com/1433-1/
7
reference_url https://usn.ubuntu.com/1446-1/
reference_id USN-1446-1
reference_type
scores
url https://usn.ubuntu.com/1446-1/
fixed_packages
aliases CVE-2012-1179
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzp6-pjj8-ruhf
5
url VCID-n2hd-pete-vka3
vulnerability_id VCID-n2hd-pete-vka3
summary kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2373.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2373
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20302
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20446
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20505
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20231
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20311
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2037
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20399
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20355
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20296
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20284
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20289
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20287
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20166
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2373
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=822821
reference_id 822821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=822821
3
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
4
reference_url https://usn.ubuntu.com/1514-1/
reference_id USN-1514-1
reference_type
scores
url https://usn.ubuntu.com/1514-1/
5
reference_url https://usn.ubuntu.com/1529-1/
reference_id USN-1529-1
reference_type
scores
url https://usn.ubuntu.com/1529-1/
6
reference_url https://usn.ubuntu.com/1532-1/
reference_id USN-1532-1
reference_type
scores
url https://usn.ubuntu.com/1532-1/
7
reference_url https://usn.ubuntu.com/1533-1/
reference_id USN-1533-1
reference_type
scores
url https://usn.ubuntu.com/1533-1/
8
reference_url https://usn.ubuntu.com/1539-1/
reference_id USN-1539-1
reference_type
scores
url https://usn.ubuntu.com/1539-1/
fixed_packages
aliases CVE-2012-2373
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2hd-pete-vka3
6
url VCID-qrt5-vdfy-k3eb
vulnerability_id VCID-qrt5-vdfy-k3eb
summary kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0044
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14915
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14963
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1504
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14845
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17597
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17659
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17677
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.1763
published_at 2026-04-12T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17578
published_at 2026-04-13T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17524
published_at 2026-04-16T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17532
published_at 2026-04-18T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17566
published_at 2026-04-21T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17476
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0044
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=772894
reference_id 772894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=772894
3
reference_url https://access.redhat.com/errata/RHSA-2012:0333
reference_id RHSA-2012:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0333
4
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
5
reference_url https://access.redhat.com/errata/RHSA-2012:1042
reference_id RHSA-2012:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1042
6
reference_url https://usn.ubuntu.com/1330-1/
reference_id USN-1330-1
reference_type
scores
url https://usn.ubuntu.com/1330-1/
7
reference_url https://usn.ubuntu.com/1336-1/
reference_id USN-1336-1
reference_type
scores
url https://usn.ubuntu.com/1336-1/
8
reference_url https://usn.ubuntu.com/1340-1/
reference_id USN-1340-1
reference_type
scores
url https://usn.ubuntu.com/1340-1/
9
reference_url https://usn.ubuntu.com/1356-1/
reference_id USN-1356-1
reference_type
scores
url https://usn.ubuntu.com/1356-1/
10
reference_url https://usn.ubuntu.com/1361-1/
reference_id USN-1361-1
reference_type
scores
url https://usn.ubuntu.com/1361-1/
11
reference_url https://usn.ubuntu.com/1362-1/
reference_id USN-1362-1
reference_type
scores
url https://usn.ubuntu.com/1362-1/
12
reference_url https://usn.ubuntu.com/1386-1/
reference_id USN-1386-1
reference_type
scores
url https://usn.ubuntu.com/1386-1/
13
reference_url https://usn.ubuntu.com/1387-1/
reference_id USN-1387-1
reference_type
scores
url https://usn.ubuntu.com/1387-1/
14
reference_url https://usn.ubuntu.com/1394-1/
reference_id USN-1394-1
reference_type
scores
url https://usn.ubuntu.com/1394-1/
15
reference_url https://usn.ubuntu.com/1555-1/
reference_id USN-1555-1
reference_type
scores
url https://usn.ubuntu.com/1555-1/
16
reference_url https://usn.ubuntu.com/1556-1/
reference_id USN-1556-1
reference_type
scores
url https://usn.ubuntu.com/1556-1/
fixed_packages
aliases CVE-2012-0044
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrt5-vdfy-k3eb
7
url VCID-ushy-m8mj-qbe6
vulnerability_id VCID-ushy-m8mj-qbe6
summary kvm: device assignment page leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2121
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32076
published_at 2026-04-01T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-02T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.3224
published_at 2026-04-04T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32065
published_at 2026-04-07T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32116
published_at 2026-04-08T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32143
published_at 2026-04-09T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32147
published_at 2026-04-11T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32109
published_at 2026-04-12T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32078
published_at 2026-04-13T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32111
published_at 2026-04-16T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32089
published_at 2026-04-18T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32061
published_at 2026-04-21T12:55:00Z
12
value 0.00127
scoring_system epss
scoring_elements 0.31896
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2121
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814149
reference_id 814149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814149
3
reference_url https://access.redhat.com/errata/RHSA-2012:0676
reference_id RHSA-2012:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0676
4
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
5
reference_url https://usn.ubuntu.com/1457-1/
reference_id USN-1457-1
reference_type
scores
url https://usn.ubuntu.com/1457-1/
6
reference_url https://usn.ubuntu.com/1470-1/
reference_id USN-1470-1
reference_type
scores
url https://usn.ubuntu.com/1470-1/
7
reference_url https://usn.ubuntu.com/1471-1/
reference_id USN-1471-1
reference_type
scores
url https://usn.ubuntu.com/1471-1/
8
reference_url https://usn.ubuntu.com/1472-1/
reference_id USN-1472-1
reference_type
scores
url https://usn.ubuntu.com/1472-1/
9
reference_url https://usn.ubuntu.com/1473-1/
reference_id USN-1473-1
reference_type
scores
url https://usn.ubuntu.com/1473-1/
10
reference_url https://usn.ubuntu.com/1474-1/
reference_id USN-1474-1
reference_type
scores
url https://usn.ubuntu.com/1474-1/
11
reference_url https://usn.ubuntu.com/1476-1/
reference_id USN-1476-1
reference_type
scores
url https://usn.ubuntu.com/1476-1/
12
reference_url https://usn.ubuntu.com/1577-1/
reference_id USN-1577-1
reference_type
scores
url https://usn.ubuntu.com/1577-1/
13
reference_url https://usn.ubuntu.com/2036-1/
reference_id USN-2036-1
reference_type
scores
url https://usn.ubuntu.com/2036-1/
14
reference_url https://usn.ubuntu.com/2037-1/
reference_id USN-2037-1
reference_type
scores
url https://usn.ubuntu.com/2037-1/
fixed_packages
aliases CVE-2012-2121
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ushy-m8mj-qbe6
8
url VCID-xgu5-vemd-jqh6
vulnerability_id VCID-xgu5-vemd-jqh6
summary kernel: kvm: buffer overflow in kvm_set_irq()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
2
reference_url http://marc.info/?l=bugtraq&m=139447903326211&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=139447903326211&w=2
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-0743.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-0743.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2137.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2137.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2137
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32545
published_at 2026-04-24T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32711
published_at 2026-04-13T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32842
published_at 2026-04-02T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32878
published_at 2026-04-04T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32699
published_at 2026-04-07T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32747
published_at 2026-04-08T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32773
published_at 2026-04-09T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32774
published_at 2026-04-11T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32737
published_at 2026-04-12T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32751
published_at 2026-04-16T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32727
published_at 2026-04-18T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32697
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2137
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137
7
reference_url http://secunia.com/advisories/50952
reference_id
reference_type
scores
url http://secunia.com/advisories/50952
8
reference_url http://secunia.com/advisories/50961
reference_id
reference_type
scores
url http://secunia.com/advisories/50961
9
reference_url http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html
reference_id
reference_type
scores
url http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html
10
reference_url http://ubuntu.com/usn/usn-1529-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1529-1
11
reference_url http://ubuntu.com/usn/usn-1607-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1607-1
12
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24
13
reference_url http://www.securityfocus.com/bid/54063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54063
14
reference_url http://www.ubuntu.com/usn/USN-1594-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1594-1
15
reference_url http://www.ubuntu.com/usn/USN-1606-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1606-1
16
reference_url http://www.ubuntu.com/usn/USN-1609-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1609-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816151
reference_id 816151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=816151
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2137
reference_id CVE-2012-2137
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-2137
23
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
24
reference_url https://usn.ubuntu.com/1514-1/
reference_id USN-1514-1
reference_type
scores
url https://usn.ubuntu.com/1514-1/
25
reference_url https://usn.ubuntu.com/1529-1/
reference_id USN-1529-1
reference_type
scores
url https://usn.ubuntu.com/1529-1/
26
reference_url https://usn.ubuntu.com/1594-1/
reference_id USN-1594-1
reference_type
scores
url https://usn.ubuntu.com/1594-1/
27
reference_url https://usn.ubuntu.com/1606-1/
reference_id USN-1606-1
reference_type
scores
url https://usn.ubuntu.com/1606-1/
28
reference_url https://usn.ubuntu.com/1607-1/
reference_id USN-1607-1
reference_type
scores
url https://usn.ubuntu.com/1607-1/
29
reference_url https://usn.ubuntu.com/1609-1/
reference_id USN-1609-1
reference_type
scores
url https://usn.ubuntu.com/1609-1/
fixed_packages
aliases CVE-2012-2137
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xgu5-vemd-jqh6
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-220.23.1%3Farch=el6