Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.18-274.7.1?arch=el5
Typerpm
Namespaceredhat
Namekernel
Version2.6.18-274.7.1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3dwn-r3us-g3f6
vulnerability_id VCID-3dwn-r3us-g3f6
summary kernel: net: improve sequence number generation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3188.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3188
reference_id
reference_type
scores
0
value 0.04324
scoring_system epss
scoring_elements 0.88858
published_at 2026-04-01T12:55:00Z
1
value 0.04324
scoring_system epss
scoring_elements 0.88866
published_at 2026-04-02T12:55:00Z
2
value 0.04324
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-04T12:55:00Z
3
value 0.04324
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-07T12:55:00Z
4
value 0.04324
scoring_system epss
scoring_elements 0.88902
published_at 2026-04-08T12:55:00Z
5
value 0.04324
scoring_system epss
scoring_elements 0.88907
published_at 2026-04-09T12:55:00Z
6
value 0.04324
scoring_system epss
scoring_elements 0.88919
published_at 2026-04-11T12:55:00Z
7
value 0.04324
scoring_system epss
scoring_elements 0.88913
published_at 2026-04-13T12:55:00Z
8
value 0.04324
scoring_system epss
scoring_elements 0.88926
published_at 2026-04-16T12:55:00Z
9
value 0.04324
scoring_system epss
scoring_elements 0.88925
published_at 2026-04-18T12:55:00Z
10
value 0.04324
scoring_system epss
scoring_elements 0.88921
published_at 2026-04-21T12:55:00Z
11
value 0.04324
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-24T12:55:00Z
12
value 0.04324
scoring_system epss
scoring_elements 0.88945
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3188
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732658
reference_id 732658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732658
3
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
4
reference_url https://access.redhat.com/errata/RHSA-2011:1419
reference_id RHSA-2011:1419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1419
5
reference_url https://access.redhat.com/errata/RHSA-2011:1465
reference_id RHSA-2011:1465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1465
6
reference_url https://access.redhat.com/errata/RHSA-2012:0010
reference_id RHSA-2012:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0010
7
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
8
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
9
reference_url https://usn.ubuntu.com/1236-1/
reference_id USN-1236-1
reference_type
scores
url https://usn.ubuntu.com/1236-1/
10
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
11
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
12
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
13
reference_url https://usn.ubuntu.com/1242-1/
reference_id USN-1242-1
reference_type
scores
url https://usn.ubuntu.com/1242-1/
14
reference_url https://usn.ubuntu.com/1243-1/
reference_id USN-1243-1
reference_type
scores
url https://usn.ubuntu.com/1243-1/
15
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
16
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
17
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
18
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-3188
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3dwn-r3us-g3f6
1
url VCID-4ysq-w8a7-g3hz
vulnerability_id VCID-4ysq-w8a7-g3hz
summary kernel: bridge: null pointer dereference in __br_deliver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2942.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2942
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5498
published_at 2026-04-29T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-01T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54976
published_at 2026-04-02T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55002
published_at 2026-04-04T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54971
published_at 2026-04-07T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.55021
published_at 2026-04-08T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.5502
published_at 2026-04-09T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.55032
published_at 2026-04-18T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.55013
published_at 2026-04-12T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54991
published_at 2026-04-13T12:55:00Z
10
value 0.00319
scoring_system epss
scoring_elements 0.55029
published_at 2026-04-16T12:55:00Z
11
value 0.00319
scoring_system epss
scoring_elements 0.5501
published_at 2026-04-21T12:55:00Z
12
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-24T12:55:00Z
13
value 0.00319
scoring_system epss
scoring_elements 0.55005
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2942
2
reference_url http://www.openwall.com/lists/oss-security/2011/10/24/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/10/24/3
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730917
reference_id 730917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730917
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-2942
reference_id CVE-2011-2942
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-2942
7
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
8
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
9
reference_url https://usn.ubuntu.com/1294-1/
reference_id USN-1294-1
reference_type
scores
url https://usn.ubuntu.com/1294-1/
fixed_packages
aliases CVE-2011-2942
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ysq-w8a7-g3hz
2
url VCID-4yz1-7pvc-97cs
vulnerability_id VCID-4yz1-7pvc-97cs
summary kernel: usb: buffer overflow in auerswald_probe()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4067
reference_id
reference_type
scores
0
value 0.00609
scoring_system epss
scoring_elements 0.69658
published_at 2026-04-01T12:55:00Z
1
value 0.00609
scoring_system epss
scoring_elements 0.6967
published_at 2026-04-02T12:55:00Z
2
value 0.00609
scoring_system epss
scoring_elements 0.69686
published_at 2026-04-04T12:55:00Z
3
value 0.00609
scoring_system epss
scoring_elements 0.69663
published_at 2026-04-07T12:55:00Z
4
value 0.00609
scoring_system epss
scoring_elements 0.69713
published_at 2026-04-08T12:55:00Z
5
value 0.00609
scoring_system epss
scoring_elements 0.6973
published_at 2026-04-09T12:55:00Z
6
value 0.00609
scoring_system epss
scoring_elements 0.69751
published_at 2026-04-11T12:55:00Z
7
value 0.00636
scoring_system epss
scoring_elements 0.70468
published_at 2026-04-12T12:55:00Z
8
value 0.00636
scoring_system epss
scoring_elements 0.70454
published_at 2026-04-13T12:55:00Z
9
value 0.00636
scoring_system epss
scoring_elements 0.70495
published_at 2026-04-16T12:55:00Z
10
value 0.00636
scoring_system epss
scoring_elements 0.70504
published_at 2026-04-18T12:55:00Z
11
value 0.00636
scoring_system epss
scoring_elements 0.70483
published_at 2026-04-21T12:55:00Z
12
value 0.00636
scoring_system epss
scoring_elements 0.70535
published_at 2026-04-24T12:55:00Z
13
value 0.00636
scoring_system epss
scoring_elements 0.70544
published_at 2026-04-26T12:55:00Z
14
value 0.00636
scoring_system epss
scoring_elements 0.70543
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4067
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722393
reference_id 722393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722393
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35957.txt
reference_id CVE-2009-4067;OSVDB-75714
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35957.txt
4
reference_url https://www.securityfocus.com/bid/48687/info
reference_id CVE-2009-4067;OSVDB-75714
reference_type exploit
scores
url https://www.securityfocus.com/bid/48687/info
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1236-1/
reference_id USN-1236-1
reference_type
scores
url https://usn.ubuntu.com/1236-1/
fixed_packages
aliases CVE-2009-4067
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz1-7pvc-97cs
3
url VCID-5qm7-9fkz-j7fb
vulnerability_id VCID-5qm7-9fkz-j7fb
summary kernel: ecryptfs: mount source TOCTOU race
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=764355487ea220fdc2faf128d577d7f679b91f97
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=764355487ea220fdc2faf128d577d7f679b91f97
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1833.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1833.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1833
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0223
published_at 2026-04-29T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-01T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02171
published_at 2026-04-11T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02178
published_at 2026-04-04T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02172
published_at 2026-04-07T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02174
published_at 2026-04-08T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02195
published_at 2026-04-26T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02156
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02153
published_at 2026-04-13T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02128
published_at 2026-04-16T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.0214
published_at 2026-04-18T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02226
published_at 2026-04-21T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02205
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1833
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
5
reference_url https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
6
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
7
reference_url http://www.ubuntu.com/usn/USN-1188-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1188-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=731172
reference_id 731172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=731172
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1833
reference_id CVE-2011-1833
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1833
61
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
62
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
63
reference_url https://usn.ubuntu.com/1188-1/
reference_id USN-1188-1
reference_type
scores
url https://usn.ubuntu.com/1188-1/
64
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
65
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
66
reference_url https://usn.ubuntu.com/1211-1/
reference_id USN-1211-1
reference_type
scores
url https://usn.ubuntu.com/1211-1/
67
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
68
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
69
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
70
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
71
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
72
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
73
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
74
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1833
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qm7-9fkz-j7fb
4
url VCID-814g-kuyq-rkhp
vulnerability_id VCID-814g-kuyq-rkhp
summary kernel: cifs: signedness issue in CIFSFindNext()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3191.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3191.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3191
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55804
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55916
published_at 2026-04-07T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55938
published_at 2026-04-04T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55966
published_at 2026-04-08T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55968
published_at 2026-04-09T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55979
published_at 2026-04-11T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55959
published_at 2026-04-12T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55941
published_at 2026-04-13T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55977
published_at 2026-04-16T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.5598
published_at 2026-04-18T12:55:00Z
10
value 0.00329
scoring_system epss
scoring_elements 0.55954
published_at 2026-04-21T12:55:00Z
11
value 0.00329
scoring_system epss
scoring_elements 0.55881
published_at 2026-04-24T12:55:00Z
12
value 0.00329
scoring_system epss
scoring_elements 0.55901
published_at 2026-04-26T12:55:00Z
13
value 0.00329
scoring_system epss
scoring_elements 0.55878
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3191
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732869
reference_id 732869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732869
3
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
4
reference_url https://access.redhat.com/errata/RHSA-2011:1465
reference_id RHSA-2011:1465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1465
5
reference_url https://access.redhat.com/errata/RHSA-2012:0010
reference_id RHSA-2012:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0010
6
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
7
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
8
reference_url https://usn.ubuntu.com/1225-1/
reference_id USN-1225-1
reference_type
scores
url https://usn.ubuntu.com/1225-1/
9
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
10
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
11
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
12
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
13
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
14
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
15
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
16
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-3191
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-814g-kuyq-rkhp
5
url VCID-c9mj-56fu-auds
vulnerability_id VCID-c9mj-56fu-auds
summary kernel: panic occurs when clock_gettime() is called
references
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8bd2258e2d520dff28c855658bd24bdafb5102d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8bd2258e2d520dff28c855658bd24bdafb5102d
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3209.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3209.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3209
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16592
published_at 2026-04-29T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16727
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16897
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16955
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16737
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16825
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16882
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16858
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16813
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16754
published_at 2026-04-13T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16689
published_at 2026-04-16T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16696
published_at 2026-04-18T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16732
published_at 2026-04-21T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16637
published_at 2026-04-24T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16627
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3209
4
reference_url https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d
5
reference_url http://www.openwall.com/lists/oss-security/2011/10/24/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/10/24/3
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732878
reference_id 732878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732878
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:linux:linux_kernel:*:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:-:*:*:*:*:x86:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3209
reference_id CVE-2011-3209
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-3209
9
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
10
reference_url https://access.redhat.com/errata/RHSA-2011:1418
reference_id RHSA-2011:1418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1418
11
reference_url https://access.redhat.com/errata/RHSA-2011:1419
reference_id RHSA-2011:1419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1419
12
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
13
reference_url https://usn.ubuntu.com/1268-1/
reference_id USN-1268-1
reference_type
scores
url https://usn.ubuntu.com/1268-1/
14
reference_url https://usn.ubuntu.com/1294-1/
reference_id USN-1294-1
reference_type
scores
url https://usn.ubuntu.com/1294-1/
fixed_packages
aliases CVE-2011-3209
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mj-56fu-auds
6
url VCID-dk3j-jd9m-w3ap
vulnerability_id VCID-dk3j-jd9m-w3ap
summary kernel: taskstats: duplicate entries in listener mode can lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2484
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19641
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19779
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19831
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19633
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19686
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19691
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19642
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19583
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19561
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19568
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.1958
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-24T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19463
published_at 2026-04-26T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.19425
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2484
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=715436
reference_id 715436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=715436
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
7
reference_url https://usn.ubuntu.com/1193-1/
reference_id USN-1193-1
reference_type
scores
url https://usn.ubuntu.com/1193-1/
8
reference_url https://usn.ubuntu.com/1201-1/
reference_id USN-1201-1
reference_type
scores
url https://usn.ubuntu.com/1201-1/
9
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
10
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
11
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
12
reference_url https://usn.ubuntu.com/1205-1/
reference_id USN-1205-1
reference_type
scores
url https://usn.ubuntu.com/1205-1/
13
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
14
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
15
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
16
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk3j-jd9m-w3ap
7
url VCID-fqyj-zxer-p3cf
vulnerability_id VCID-fqyj-zxer-p3cf
summary kernel: tpm infoleaks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1160.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1160
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38722
published_at 2026-04-01T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.3886
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38881
published_at 2026-04-04T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.3881
published_at 2026-04-07T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38863
published_at 2026-04-08T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38876
published_at 2026-04-09T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38888
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38851
published_at 2026-04-12T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38824
published_at 2026-04-13T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38869
published_at 2026-04-16T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38847
published_at 2026-04-18T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38767
published_at 2026-04-21T12:55:00Z
12
value 0.00174
scoring_system epss
scoring_elements 0.38601
published_at 2026-04-24T12:55:00Z
13
value 0.00174
scoring_system epss
scoring_elements 0.38577
published_at 2026-04-26T12:55:00Z
14
value 0.00174
scoring_system epss
scoring_elements 0.38488
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1160
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=684671
reference_id 684671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=684671
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1160
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqyj-zxer-p3cf
8
url VCID-gth4-k932-3yer
vulnerability_id VCID-gth4-k932-3yer
summary kernel: ipv6: make fragment identifications less predictable
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2699.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2699
reference_id
reference_type
scores
0
value 0.01359
scoring_system epss
scoring_elements 0.80103
published_at 2026-04-01T12:55:00Z
1
value 0.01359
scoring_system epss
scoring_elements 0.8011
published_at 2026-04-02T12:55:00Z
2
value 0.01359
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-04T12:55:00Z
3
value 0.01359
scoring_system epss
scoring_elements 0.80118
published_at 2026-04-07T12:55:00Z
4
value 0.01359
scoring_system epss
scoring_elements 0.80147
published_at 2026-04-08T12:55:00Z
5
value 0.01359
scoring_system epss
scoring_elements 0.80154
published_at 2026-04-09T12:55:00Z
6
value 0.01359
scoring_system epss
scoring_elements 0.80172
published_at 2026-04-11T12:55:00Z
7
value 0.01359
scoring_system epss
scoring_elements 0.80157
published_at 2026-04-12T12:55:00Z
8
value 0.01359
scoring_system epss
scoring_elements 0.80149
published_at 2026-04-13T12:55:00Z
9
value 0.01359
scoring_system epss
scoring_elements 0.80178
published_at 2026-04-18T12:55:00Z
10
value 0.01359
scoring_system epss
scoring_elements 0.80181
published_at 2026-04-21T12:55:00Z
11
value 0.01359
scoring_system epss
scoring_elements 0.8021
published_at 2026-04-24T12:55:00Z
12
value 0.01359
scoring_system epss
scoring_elements 0.80219
published_at 2026-04-26T12:55:00Z
13
value 0.01359
scoring_system epss
scoring_elements 0.80235
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2699
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=723429
reference_id 723429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=723429
3
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
4
reference_url https://access.redhat.com/errata/RHSA-2011:1465
reference_id RHSA-2011:1465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1465
5
reference_url https://access.redhat.com/errata/RHSA-2012:0358
reference_id RHSA-2012:0358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0358
6
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
7
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
8
reference_url https://usn.ubuntu.com/1211-1/
reference_id USN-1211-1
reference_type
scores
url https://usn.ubuntu.com/1211-1/
9
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
10
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
11
reference_url https://usn.ubuntu.com/1225-1/
reference_id USN-1225-1
reference_type
scores
url https://usn.ubuntu.com/1225-1/
12
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
13
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
14
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
15
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
16
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2699
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gth4-k932-3yer
9
url VCID-krvj-487p-auep
vulnerability_id VCID-krvj-487p-auep
summary kernel: ext4: kernel panic when writing data to the last block of sparse file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2695
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20809
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20957
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.21016
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20732
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20871
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20844
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20791
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20781
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20774
published_at 2026-04-18T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.2076
published_at 2026-04-21T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20642
published_at 2026-04-24T12:55:00Z
13
value 0.00067
scoring_system epss
scoring_elements 0.20637
published_at 2026-04-26T12:55:00Z
14
value 0.00067
scoring_system epss
scoring_elements 0.20603
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2695
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722557
reference_id 722557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722557
3
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
4
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
7
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
8
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
9
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
10
reference_url https://usn.ubuntu.com/1242-1/
reference_id USN-1242-1
reference_type
scores
url https://usn.ubuntu.com/1242-1/
11
reference_url https://usn.ubuntu.com/1243-1/
reference_id USN-1243-1
reference_type
scores
url https://usn.ubuntu.com/1243-1/
12
reference_url https://usn.ubuntu.com/1244-1/
reference_id USN-1244-1
reference_type
scores
url https://usn.ubuntu.com/1244-1/
13
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
14
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
15
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2695
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krvj-487p-auep
10
url VCID-mtet-bdcj-tffd
vulnerability_id VCID-mtet-bdcj-tffd
summary Xen DoS using IOMMU faults from PCI-passthrough guest
references
0
reference_url http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html
reference_id
reference_type
scores
url http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html
1
reference_url http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html
reference_id
reference_type
scores
url http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3131.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3131.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3131
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16846
published_at 2026-04-29T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17015
published_at 2026-04-01T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17186
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17237
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17017
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17108
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17165
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.1714
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17093
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17032
published_at 2026-04-13T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16967
published_at 2026-04-16T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16971
published_at 2026-04-18T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.17008
published_at 2026-04-21T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.16911
published_at 2026-04-24T12:55:00Z
14
value 0.00054
scoring_system epss
scoring_elements 0.16896
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3131
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3131
5
reference_url http://secunia.com/advisories/45622
reference_id
reference_type
scores
url http://secunia.com/advisories/45622
6
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
7
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
8
reference_url http://www.securityfocus.com/bid/49146
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/49146
9
reference_url http://xenbits.xen.org/hg/staging/xen-4.1-testing.hg/rev/84e3706df07a
reference_id
reference_type
scores
url http://xenbits.xen.org/hg/staging/xen-4.1-testing.hg/rev/84e3706df07a
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730341
reference_id 730341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730341
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3131
reference_id CVE-2011-3131
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-3131
13
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
14
reference_url https://xenbits.xen.org/xsa/advisory-5.html
reference_id XSA-5
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-5.html
fixed_packages
aliases CVE-2011-3131
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtet-bdcj-tffd
11
url VCID-rcsx-nhxh-4fcy
vulnerability_id VCID-rcsx-nhxh-4fcy
summary kernel: gro: only reset frag0 when skb can be pulled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2723.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2723
reference_id
reference_type
scores
0
value 0.00842
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-01T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74691
published_at 2026-04-07T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74718
published_at 2026-04-04T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74723
published_at 2026-04-08T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-09T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-11T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.7474
published_at 2026-04-12T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.74731
published_at 2026-04-13T12:55:00Z
8
value 0.00842
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-16T12:55:00Z
9
value 0.00842
scoring_system epss
scoring_elements 0.74776
published_at 2026-04-18T12:55:00Z
10
value 0.00842
scoring_system epss
scoring_elements 0.74765
published_at 2026-04-21T12:55:00Z
11
value 0.00842
scoring_system epss
scoring_elements 0.74801
published_at 2026-04-24T12:55:00Z
12
value 0.00842
scoring_system epss
scoring_elements 0.74808
published_at 2026-04-26T12:55:00Z
13
value 0.00842
scoring_system epss
scoring_elements 0.74811
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2723
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=726552
reference_id 726552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=726552
3
reference_url https://access.redhat.com/errata/RHSA-2011:1321
reference_id RHSA-2011:1321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1321
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://access.redhat.com/errata/RHSA-2012:0010
reference_id RHSA-2012:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0010
7
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
8
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
9
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
10
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
11
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
12
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
13
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
14
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
15
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
16
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2723
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcsx-nhxh-4fcy
12
url VCID-ry7x-b642-77er
vulnerability_id VCID-ry7x-b642-77er
summary kernel: be2net: promiscuous mode and non-member VLAN packets DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3347.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3347
reference_id
reference_type
scores
0
value 0.00541
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-29T12:55:00Z
1
value 0.00541
scoring_system epss
scoring_elements 0.67577
published_at 2026-04-01T12:55:00Z
2
value 0.00541
scoring_system epss
scoring_elements 0.67614
published_at 2026-04-07T12:55:00Z
3
value 0.00541
scoring_system epss
scoring_elements 0.67635
published_at 2026-04-04T12:55:00Z
4
value 0.00541
scoring_system epss
scoring_elements 0.67665
published_at 2026-04-08T12:55:00Z
5
value 0.00541
scoring_system epss
scoring_elements 0.6768
published_at 2026-04-09T12:55:00Z
6
value 0.00541
scoring_system epss
scoring_elements 0.67703
published_at 2026-04-11T12:55:00Z
7
value 0.00541
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-12T12:55:00Z
8
value 0.00541
scoring_system epss
scoring_elements 0.67654
published_at 2026-04-13T12:55:00Z
9
value 0.00541
scoring_system epss
scoring_elements 0.6769
published_at 2026-04-16T12:55:00Z
10
value 0.00541
scoring_system epss
scoring_elements 0.67702
published_at 2026-04-24T12:55:00Z
11
value 0.00541
scoring_system epss
scoring_elements 0.67682
published_at 2026-04-21T12:55:00Z
12
value 0.00541
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3347
2
reference_url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd
reference_id
reference_type
scores
url https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=736425
reference_id 736425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=736425
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3347
reference_id CVE-2011-3347
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-3347
6
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
7
reference_url https://access.redhat.com/errata/RHSA-2011:1530
reference_id RHSA-2011:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1530
8
reference_url https://access.redhat.com/errata/RHSA-2012:0116
reference_id RHSA-2012:0116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0116
9
reference_url https://usn.ubuntu.com/1404-1/
reference_id USN-1404-1
reference_type
scores
url https://usn.ubuntu.com/1404-1/
10
reference_url https://usn.ubuntu.com/1409-1/
reference_id USN-1409-1
reference_type
scores
url https://usn.ubuntu.com/1409-1/
11
reference_url https://usn.ubuntu.com/1412-1/
reference_id USN-1412-1
reference_type
scores
url https://usn.ubuntu.com/1412-1/
fixed_packages
aliases CVE-2011-3347
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ry7x-b642-77er
13
url VCID-u5y7-amh6-3uec
vulnerability_id VCID-u5y7-amh6-3uec
summary kernel: cifs session reuse
references
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1585.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1585.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1585
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15707
published_at 2026-04-29T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15818
published_at 2026-04-01T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15883
published_at 2026-04-02T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15946
published_at 2026-04-04T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15745
published_at 2026-04-07T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-08T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15891
published_at 2026-04-09T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15866
published_at 2026-04-11T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15829
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15759
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15682
published_at 2026-04-16T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15692
published_at 2026-04-18T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15737
published_at 2026-04-21T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.15754
published_at 2026-04-24T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15751
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1585
5
reference_url https://github.com/torvalds/linux/commit/4ff67b720c02c36e54d55b88c2931879b7db1cd2
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/4ff67b720c02c36e54d55b88c2931879b7db1cd2
6
reference_url http://www.openwall.com/lists/oss-security/2011/04/15/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/04/15/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=697394
reference_id 697394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=697394
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1585
reference_id CVE-2011-1585
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1585
11
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
12
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
13
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
14
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
15
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
16
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
18
reference_url https://usn.ubuntu.com/1268-1/
reference_id USN-1268-1
reference_type
scores
url https://usn.ubuntu.com/1268-1/
19
reference_url https://usn.ubuntu.com/1271-1/
reference_id USN-1271-1
reference_type
scores
url https://usn.ubuntu.com/1271-1/
20
reference_url https://usn.ubuntu.com/1272-1/
reference_id USN-1272-1
reference_type
scores
url https://usn.ubuntu.com/1272-1/
21
reference_url https://usn.ubuntu.com/1278-1/
reference_id USN-1278-1
reference_type
scores
url https://usn.ubuntu.com/1278-1/
22
reference_url https://usn.ubuntu.com/1280-1/
reference_id USN-1280-1
reference_type
scores
url https://usn.ubuntu.com/1280-1/
fixed_packages
aliases CVE-2011-1585
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5y7-amh6-3uec
14
url VCID-uvtu-2xmq-jfbw
vulnerability_id VCID-uvtu-2xmq-jfbw
summary kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2496
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13677
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13772
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13828
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13627
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13708
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13759
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13729
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13692
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13643
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13552
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13624
published_at 2026-04-21T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13636
published_at 2026-04-24T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-26T12:55:00Z
14
value 0.00045
scoring_system epss
scoring_elements 0.13509
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2496
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=716538
reference_id 716538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=716538
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
7
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
8
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
9
reference_url https://usn.ubuntu.com/1268-1/
reference_id USN-1268-1
reference_type
scores
url https://usn.ubuntu.com/1268-1/
10
reference_url https://usn.ubuntu.com/1269-1/
reference_id USN-1269-1
reference_type
scores
url https://usn.ubuntu.com/1269-1/
11
reference_url https://usn.ubuntu.com/1272-1/
reference_id USN-1272-1
reference_type
scores
url https://usn.ubuntu.com/1272-1/
12
reference_url https://usn.ubuntu.com/1274-1/
reference_id USN-1274-1
reference_type
scores
url https://usn.ubuntu.com/1274-1/
13
reference_url https://usn.ubuntu.com/1278-1/
reference_id USN-1278-1
reference_type
scores
url https://usn.ubuntu.com/1278-1/
14
reference_url https://usn.ubuntu.com/1280-1/
reference_id USN-1280-1
reference_type
scores
url https://usn.ubuntu.com/1280-1/
15
reference_url https://usn.ubuntu.com/1281-1/
reference_id USN-1281-1
reference_type
scores
url https://usn.ubuntu.com/1281-1/
16
reference_url https://usn.ubuntu.com/1286-1/
reference_id USN-1286-1
reference_type
scores
url https://usn.ubuntu.com/1286-1/
fixed_packages
aliases CVE-2011-2496
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvtu-2xmq-jfbw
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-274.7.1%3Farch=el5