Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-131.17.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-131.17.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4gcp-bfru-57ay
vulnerability_id VCID-4gcp-bfru-57ay
summary kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2022
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13119
published_at 2026-04-26T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13156
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13266
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13331
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13128
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1323
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13193
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13141
published_at 2026-04-21T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-18T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2022
6
reference_url https://lkml.org/lkml/2011/4/14/293
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/293
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
8
reference_url http://www.securityfocus.com/bid/47843
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47843
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698996
reference_id 698996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698996
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-2022
reference_id CVE-2011-2022
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-2022
18
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
19
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
20
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
21
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
31
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-2022
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gcp-bfru-57ay
1
url VCID-5qm7-9fkz-j7fb
vulnerability_id VCID-5qm7-9fkz-j7fb
summary kernel: ecryptfs: mount source TOCTOU race
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=764355487ea220fdc2faf128d577d7f679b91f97
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=764355487ea220fdc2faf128d577d7f679b91f97
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1833.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1833.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1833
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02205
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-01T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02171
published_at 2026-04-11T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02178
published_at 2026-04-04T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02172
published_at 2026-04-07T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02174
published_at 2026-04-08T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02195
published_at 2026-04-26T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02156
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02153
published_at 2026-04-13T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02128
published_at 2026-04-16T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.0214
published_at 2026-04-18T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02226
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1833
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
5
reference_url https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
6
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
7
reference_url http://www.ubuntu.com/usn/USN-1188-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1188-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=731172
reference_id 731172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=731172
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1833
reference_id CVE-2011-1833
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1833
61
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
62
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
63
reference_url https://usn.ubuntu.com/1188-1/
reference_id USN-1188-1
reference_type
scores
url https://usn.ubuntu.com/1188-1/
64
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
65
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
66
reference_url https://usn.ubuntu.com/1211-1/
reference_id USN-1211-1
reference_type
scores
url https://usn.ubuntu.com/1211-1/
67
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
68
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
69
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
70
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
71
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
72
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
73
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
74
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1833
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qm7-9fkz-j7fb
2
url VCID-8uu6-qhdz-qqff
vulnerability_id VCID-8uu6-qhdz-qqff
summary kernel: perf: Fix software event overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2918
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30571
published_at 2026-04-01T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30707
published_at 2026-04-02T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30754
published_at 2026-04-04T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30568
published_at 2026-04-07T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30627
published_at 2026-04-08T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30661
published_at 2026-04-09T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30665
published_at 2026-04-11T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-12T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30575
published_at 2026-04-13T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34209
published_at 2026-04-16T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34196
published_at 2026-04-18T12:55:00Z
11
value 0.0014
scoring_system epss
scoring_elements 0.34162
published_at 2026-04-21T12:55:00Z
12
value 0.0014
scoring_system epss
scoring_elements 0.33789
published_at 2026-04-24T12:55:00Z
13
value 0.0014
scoring_system epss
scoring_elements 0.33767
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2918
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730706
reference_id 730706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730706
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c
reference_id CVE-2011-2918
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2012:0333
reference_id RHSA-2012:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0333
6
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
7
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
8
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
9
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
10
reference_url https://usn.ubuntu.com/1211-1/
reference_id USN-1211-1
reference_type
scores
url https://usn.ubuntu.com/1211-1/
11
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
12
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
13
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
14
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
15
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2918
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uu6-qhdz-qqff
3
url VCID-dk3j-jd9m-w3ap
vulnerability_id VCID-dk3j-jd9m-w3ap
summary kernel: taskstats: duplicate entries in listener mode can lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2484
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19641
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19779
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19831
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19633
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19686
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19691
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19642
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19583
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19561
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19568
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.1958
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-24T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19463
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2484
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=715436
reference_id 715436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=715436
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
7
reference_url https://usn.ubuntu.com/1193-1/
reference_id USN-1193-1
reference_type
scores
url https://usn.ubuntu.com/1193-1/
8
reference_url https://usn.ubuntu.com/1201-1/
reference_id USN-1201-1
reference_type
scores
url https://usn.ubuntu.com/1201-1/
9
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
10
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
11
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
12
reference_url https://usn.ubuntu.com/1205-1/
reference_id USN-1205-1
reference_type
scores
url https://usn.ubuntu.com/1205-1/
13
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
14
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
15
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
16
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk3j-jd9m-w3ap
4
url VCID-dx7m-ma2j-6ket
vulnerability_id VCID-dx7m-ma2j-6ket
summary kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13119
published_at 2026-04-26T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13156
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13266
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13331
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13128
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1323
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13193
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13141
published_at 2026-04-21T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-18T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
6
reference_url https://lkml.org/lkml/2011/4/14/293
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/293
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
8
reference_url http://www.securityfocus.com/bid/47534
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47534
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698996
reference_id 698996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698996
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
reference_id CVE-2011-1745
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
18
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
19
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
20
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
21
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
31
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1745
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dx7m-ma2j-6ket
5
url VCID-fhyj-cymx-pfgp
vulnerability_id VCID-fhyj-cymx-pfgp
summary kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1746
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12213
published_at 2026-04-26T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12237
published_at 2026-04-01T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12352
published_at 2026-04-02T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-04T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12199
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12279
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12329
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12336
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.123
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12262
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12153
published_at 2026-04-16T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12155
published_at 2026-04-18T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12265
published_at 2026-04-21T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12246
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1746
6
reference_url https://lkml.org/lkml/2011/4/14/294
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/294
7
reference_url https://lkml.org/lkml/2011/4/19/400
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/19/400
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
9
reference_url http://www.securityfocus.com/bid/47535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47535
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698998
reference_id 698998
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698998
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1746
reference_id CVE-2011-1746
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1746
19
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
20
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
21
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
22
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1183-1/
reference_id USN-1183-1
reference_type
scores
url https://usn.ubuntu.com/1183-1/
30
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
31
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
32
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1746
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhyj-cymx-pfgp
6
url VCID-fqyj-zxer-p3cf
vulnerability_id VCID-fqyj-zxer-p3cf
summary kernel: tpm infoleaks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1160.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1160
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38722
published_at 2026-04-01T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.3886
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38881
published_at 2026-04-04T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.3881
published_at 2026-04-07T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38863
published_at 2026-04-08T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38876
published_at 2026-04-09T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38888
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38851
published_at 2026-04-12T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38824
published_at 2026-04-13T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38869
published_at 2026-04-16T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38847
published_at 2026-04-18T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38767
published_at 2026-04-21T12:55:00Z
12
value 0.00174
scoring_system epss
scoring_elements 0.38601
published_at 2026-04-24T12:55:00Z
13
value 0.00174
scoring_system epss
scoring_elements 0.38577
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1160
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=684671
reference_id 684671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=684671
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1160
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqyj-zxer-p3cf
7
url VCID-hs39-gt1g-8kc3
vulnerability_id VCID-hs39-gt1g-8kc3
summary kernel: perf, x86: fix Intel fixed counters base initialization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2521.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2521
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19686
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19831
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19885
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19612
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19692
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19742
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19746
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19697
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19639
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19616
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19618
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19633
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19525
published_at 2026-04-24T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19514
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2521
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=719228
reference_id 719228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=719228
3
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
fixed_packages
aliases CVE-2011-2521
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs39-gt1g-8kc3
8
url VCID-rcsx-nhxh-4fcy
vulnerability_id VCID-rcsx-nhxh-4fcy
summary kernel: gro: only reset frag0 when skb can be pulled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2723.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2723
reference_id
reference_type
scores
0
value 0.00842
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-01T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74691
published_at 2026-04-07T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74718
published_at 2026-04-04T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74723
published_at 2026-04-08T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-09T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-11T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.7474
published_at 2026-04-12T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.74731
published_at 2026-04-13T12:55:00Z
8
value 0.00842
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-16T12:55:00Z
9
value 0.00842
scoring_system epss
scoring_elements 0.74776
published_at 2026-04-18T12:55:00Z
10
value 0.00842
scoring_system epss
scoring_elements 0.74765
published_at 2026-04-21T12:55:00Z
11
value 0.00842
scoring_system epss
scoring_elements 0.74801
published_at 2026-04-24T12:55:00Z
12
value 0.00842
scoring_system epss
scoring_elements 0.74808
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2723
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=726552
reference_id 726552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=726552
3
reference_url https://access.redhat.com/errata/RHSA-2011:1321
reference_id RHSA-2011:1321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1321
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://access.redhat.com/errata/RHSA-2012:0010
reference_id RHSA-2012:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0010
7
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
8
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
9
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
10
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
11
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
12
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
13
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
14
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
15
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
16
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2723
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcsx-nhxh-4fcy
9
url VCID-uvtu-2xmq-jfbw
vulnerability_id VCID-uvtu-2xmq-jfbw
summary kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2496
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13677
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13772
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13828
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13627
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13708
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13759
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13729
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13692
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13643
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13552
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13624
published_at 2026-04-21T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13636
published_at 2026-04-24T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2496
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=716538
reference_id 716538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=716538
3
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
4
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
5
reference_url https://access.redhat.com/errata/RHSA-2011:1386
reference_id RHSA-2011:1386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1386
6
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
7
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
8
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
9
reference_url https://usn.ubuntu.com/1268-1/
reference_id USN-1268-1
reference_type
scores
url https://usn.ubuntu.com/1268-1/
10
reference_url https://usn.ubuntu.com/1269-1/
reference_id USN-1269-1
reference_type
scores
url https://usn.ubuntu.com/1269-1/
11
reference_url https://usn.ubuntu.com/1272-1/
reference_id USN-1272-1
reference_type
scores
url https://usn.ubuntu.com/1272-1/
12
reference_url https://usn.ubuntu.com/1274-1/
reference_id USN-1274-1
reference_type
scores
url https://usn.ubuntu.com/1274-1/
13
reference_url https://usn.ubuntu.com/1278-1/
reference_id USN-1278-1
reference_type
scores
url https://usn.ubuntu.com/1278-1/
14
reference_url https://usn.ubuntu.com/1280-1/
reference_id USN-1280-1
reference_type
scores
url https://usn.ubuntu.com/1280-1/
15
reference_url https://usn.ubuntu.com/1281-1/
reference_id USN-1281-1
reference_type
scores
url https://usn.ubuntu.com/1281-1/
16
reference_url https://usn.ubuntu.com/1286-1/
reference_id USN-1286-1
reference_type
scores
url https://usn.ubuntu.com/1286-1/
fixed_packages
aliases CVE-2011-2496
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvtu-2xmq-jfbw
10
url VCID-yr1x-jyca-tbb7
vulnerability_id VCID-yr1x-jyca-tbb7
summary kernel: af_packet: infoleak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2898.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2898
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23219
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23397
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23346
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23366
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23328
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23272
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23288
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23283
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23265
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23075
published_at 2026-04-24T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.23069
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2898
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=728023
reference_id 728023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=728023
3
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
4
reference_url https://access.redhat.com/errata/RHSA-2012:0010
reference_id RHSA-2012:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0010
fixed_packages
aliases CVE-2011-2898
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yr1x-jyca-tbb7
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.17.1%3Farch=el6