Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-279.5.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-279.5.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-hguq-xxx4-auf7
vulnerability_id VCID-hguq-xxx4-auf7
summary kernel: drm/i915: integer overflow in i915_gem_execbuffer2()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2383.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2383
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20031
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20178
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19962
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.201
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20118
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20073
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20015
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19997
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20001
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-21T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19886
published_at 2026-04-24T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19881
published_at 2026-04-26T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19849
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2383
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=824176
reference_id 824176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=824176
3
reference_url https://access.redhat.com/errata/RHSA-2012:1156
reference_id RHSA-2012:1156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1156
4
reference_url https://usn.ubuntu.com/1471-1/
reference_id USN-1471-1
reference_type
scores
url https://usn.ubuntu.com/1471-1/
5
reference_url https://usn.ubuntu.com/1472-1/
reference_id USN-1472-1
reference_type
scores
url https://usn.ubuntu.com/1472-1/
6
reference_url https://usn.ubuntu.com/1473-1/
reference_id USN-1473-1
reference_type
scores
url https://usn.ubuntu.com/1473-1/
7
reference_url https://usn.ubuntu.com/1474-1/
reference_id USN-1474-1
reference_type
scores
url https://usn.ubuntu.com/1474-1/
8
reference_url https://usn.ubuntu.com/1476-1/
reference_id USN-1476-1
reference_type
scores
url https://usn.ubuntu.com/1476-1/
fixed_packages
aliases CVE-2012-2383
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hguq-xxx4-auf7
1
url VCID-ytng-8j5w-17ea
vulnerability_id VCID-ytng-8j5w-17ea
summary kernel: bt sco_conninfo infoleak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1078.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1078
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11348
published_at 2026-04-18T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11472
published_at 2026-04-21T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11425
published_at 2026-04-24T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11383
published_at 2026-04-26T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11308
published_at 2026-04-29T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15451
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15412
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15402
published_at 2026-04-01T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15307
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15224
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15373
published_at 2026-04-12T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15443
published_at 2026-04-02T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15512
published_at 2026-04-04T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15313
published_at 2026-04-07T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15401
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1078
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681259
reference_id 681259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681259
3
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
4
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
5
reference_url https://access.redhat.com/errata/RHSA-2012:1156
reference_id RHSA-2012:1156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1156
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1078
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytng-8j5w-17ea
Fixing_vulnerabilities
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-279.5.1%3Farch=el6