Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
Typerpm
Namespaceredhat
Namekernel
Version2.6.18-238.19.1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1rgx-tmw4-uqgt
vulnerability_id VCID-1rgx-tmw4-uqgt
summary kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1573
reference_id
reference_type
scores
0
value 0.00751
scoring_system epss
scoring_elements 0.73116
published_at 2026-04-01T12:55:00Z
1
value 0.00751
scoring_system epss
scoring_elements 0.73126
published_at 2026-04-02T12:55:00Z
2
value 0.00751
scoring_system epss
scoring_elements 0.73147
published_at 2026-04-04T12:55:00Z
3
value 0.00751
scoring_system epss
scoring_elements 0.73122
published_at 2026-04-07T12:55:00Z
4
value 0.00751
scoring_system epss
scoring_elements 0.73158
published_at 2026-04-08T12:55:00Z
5
value 0.00751
scoring_system epss
scoring_elements 0.73171
published_at 2026-04-09T12:55:00Z
6
value 0.00751
scoring_system epss
scoring_elements 0.73196
published_at 2026-04-11T12:55:00Z
7
value 0.00751
scoring_system epss
scoring_elements 0.73176
published_at 2026-04-12T12:55:00Z
8
value 0.00751
scoring_system epss
scoring_elements 0.7317
published_at 2026-04-13T12:55:00Z
9
value 0.00751
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-16T12:55:00Z
10
value 0.00751
scoring_system epss
scoring_elements 0.73222
published_at 2026-04-18T12:55:00Z
11
value 0.00751
scoring_system epss
scoring_elements 0.73215
published_at 2026-04-21T12:55:00Z
12
value 0.00751
scoring_system epss
scoring_elements 0.7325
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1573
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=695383
reference_id 695383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=695383
3
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
4
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
5
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
6
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
7
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
8
reference_url https://usn.ubuntu.com/1236-1/
reference_id USN-1236-1
reference_type
scores
url https://usn.ubuntu.com/1236-1/
9
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
10
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1573
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgx-tmw4-uqgt
1
url VCID-4gcp-bfru-57ay
vulnerability_id VCID-4gcp-bfru-57ay
summary kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2022
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-24T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13156
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13266
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13331
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13128
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1323
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13193
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13141
published_at 2026-04-21T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2022
6
reference_url https://lkml.org/lkml/2011/4/14/293
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/293
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
8
reference_url http://www.securityfocus.com/bid/47843
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47843
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698996
reference_id 698996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698996
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-2022
reference_id CVE-2011-2022
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-2022
18
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
19
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
20
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
21
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
31
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-2022
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gcp-bfru-57ay
2
url VCID-8nyx-mdyc-t3ez
vulnerability_id VCID-8nyx-mdyc-t3ez
summary kernel: xen: vmx: insecure cpuid vmexit
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1936
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24421
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24546
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24582
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.2436
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24429
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24473
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24488
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24444
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24386
published_at 2026-04-13T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24402
published_at 2026-04-16T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24393
published_at 2026-04-18T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24365
published_at 2026-04-21T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24239
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1936
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=706323
reference_id 706323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=706323
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
fixed_packages
aliases CVE-2011-1936
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyx-mdyc-t3ez
3
url VCID-a9mu-gdgc-cbct
vulnerability_id VCID-a9mu-gdgc-cbct
summary kernel: validate size of EFI GUID partition entries
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1776
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18585
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.1864
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18349
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18431
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18483
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18484
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18436
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18385
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18329
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18369
published_at 2026-04-21T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18269
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1776
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=703026
reference_id 703026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=703026
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
4
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
5
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
6
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
7
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
8
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
9
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
10
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
11
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
12
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
13
reference_url https://usn.ubuntu.com/1225-1/
reference_id USN-1225-1
reference_type
scores
url https://usn.ubuntu.com/1225-1/
14
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
15
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
16
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1776
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9mu-gdgc-cbct
4
url VCID-au4y-xz41-zyfy
vulnerability_id VCID-au4y-xz41-zyfy
summary kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2492
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17316
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17485
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17533
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17314
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17405
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17465
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17478
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17431
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17377
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.1732
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17328
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17359
published_at 2026-04-21T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17266
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2492
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=703019
reference_id 703019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=703019
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
4
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
5
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
6
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
7
reference_url https://usn.ubuntu.com/1201-1/
reference_id USN-1201-1
reference_type
scores
url https://usn.ubuntu.com/1201-1/
8
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
9
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
10
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
11
reference_url https://usn.ubuntu.com/1205-1/
reference_id USN-1205-1
reference_type
scores
url https://usn.ubuntu.com/1205-1/
12
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
13
reference_url https://usn.ubuntu.com/1211-1/
reference_id USN-1211-1
reference_type
scores
url https://usn.ubuntu.com/1211-1/
14
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
15
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
16
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2492
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au4y-xz41-zyfy
5
url VCID-dd7k-u8ev-abhz
vulnerability_id VCID-dd7k-u8ev-abhz
summary kernel signal spoofing issue
references
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c
2
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1182
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-24T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23548
published_at 2026-04-01T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23707
published_at 2026-04-02T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.2375
published_at 2026-04-04T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.2353
published_at 2026-04-07T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23601
published_at 2026-04-08T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23647
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23663
published_at 2026-04-11T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23621
published_at 2026-04-12T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23564
published_at 2026-04-13T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23577
published_at 2026-04-16T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23566
published_at 2026-04-18T12:55:00Z
12
value 0.0008
scoring_system epss
scoring_elements 0.23545
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1182
5
reference_url https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c
6
reference_url http://www.openwall.com/lists/oss-security/2011/03/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/03/23/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=690028
reference_id 690028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=690028
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1182
reference_id CVE-2011-1182
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1182
16
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
17
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
18
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
19
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
20
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
21
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
22
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
23
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
24
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
25
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
26
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1182
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dd7k-u8ev-abhz
6
url VCID-dx7m-ma2j-6ket
vulnerability_id VCID-dx7m-ma2j-6ket
summary kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-24T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13156
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13266
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13331
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13128
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1323
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13193
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13141
published_at 2026-04-21T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
6
reference_url https://lkml.org/lkml/2011/4/14/293
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/293
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
8
reference_url http://www.securityfocus.com/bid/47534
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47534
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698996
reference_id 698996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698996
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
reference_id CVE-2011-1745
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
18
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
19
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
20
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
21
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
31
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1745
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dx7m-ma2j-6ket
7
url VCID-fhyj-cymx-pfgp
vulnerability_id VCID-fhyj-cymx-pfgp
summary kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1746
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12246
published_at 2026-04-24T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12237
published_at 2026-04-01T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12352
published_at 2026-04-02T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-04T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12199
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12279
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12329
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12336
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.123
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12262
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12153
published_at 2026-04-16T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12155
published_at 2026-04-18T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12265
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1746
6
reference_url https://lkml.org/lkml/2011/4/14/294
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/294
7
reference_url https://lkml.org/lkml/2011/4/19/400
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/19/400
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
9
reference_url http://www.securityfocus.com/bid/47535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47535
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698998
reference_id 698998
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698998
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1746
reference_id CVE-2011-1746
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1746
19
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
20
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
21
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
22
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1183-1/
reference_id USN-1183-1
reference_type
scores
url https://usn.ubuntu.com/1183-1/
30
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
31
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
32
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1746
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhyj-cymx-pfgp
8
url VCID-j67y-7adf-3ygp
vulnerability_id VCID-j67y-7adf-3ygp
summary kernel: proc: signedness issue in next_pidmap()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1
2
reference_url http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source
reference_id
reference_type
scores
url http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source
3
reference_url http://openwall.com/lists/oss-security/2011/04/19/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/19/1
4
reference_url http://openwall.com/lists/oss-security/2011/04/20/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/20/1
5
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1593
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.1256
published_at 2026-04-24T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12553
published_at 2026-04-21T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12658
published_at 2026-04-02T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-04T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12512
published_at 2026-04-07T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1259
published_at 2026-04-08T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12641
published_at 2026-04-09T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12609
published_at 2026-04-11T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12568
published_at 2026-04-12T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12529
published_at 2026-04-13T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12434
published_at 2026-04-16T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12438
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1593
8
reference_url http://secunia.com/advisories/44164
reference_id
reference_type
scores
url http://secunia.com/advisories/44164
9
reference_url http://securitytracker.com/id?1025420
reference_id
reference_type
scores
url http://securitytracker.com/id?1025420
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66876
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66876
11
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4
12
reference_url http://www.securityfocus.com/bid/47497
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47497
13
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=697822
reference_id 697822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=697822
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1593
reference_id CVE-2011-1593
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1593
24
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
25
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
26
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
27
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
28
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
29
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
30
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
31
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
32
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
33
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
34
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
35
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
36
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
37
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1593
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j67y-7adf-3ygp
9
url VCID-ku5j-hkct-aug2
vulnerability_id VCID-ku5j-hkct-aug2
summary kernel: panic in ib_cm:cm_work_handler
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63324
published_at 2026-04-24T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63193
published_at 2026-04-01T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63253
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63282
published_at 2026-04-04T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63247
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63316
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63317
published_at 2026-04-16T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63281
published_at 2026-04-13T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63325
published_at 2026-04-18T12:55:00Z
11
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
3
reference_url http://secunia.com/advisories/43693
reference_id
reference_type
scores
url http://secunia.com/advisories/43693
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
5
reference_url http://www.openwall.com/lists/oss-security/2011/03/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/03/11/1
6
reference_url http://www.securityfocus.com/bid/46839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46839
7
reference_url http://www.spinics.net/lists/linux-rdma/msg07447.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07447.html
8
reference_url http://www.spinics.net/lists/linux-rdma/msg07448.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07448.html
9
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=653648
reference_id 653648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=653648
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
reference_id CVE-2011-0695
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
19
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
20
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
21
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
22
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
23
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
24
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
25
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
28
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0695
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2
10
url VCID-nktq-p6vq-hkgq
vulnerability_id VCID-nktq-p6vq-hkgq
summary kernel: inet_diag: insufficient validation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2213
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19618
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19756
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19808
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.1953
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19609
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19662
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19666
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19617
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19558
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19523
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19531
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19543
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19438
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2213
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=714536
reference_id 714536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=714536
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
4
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
5
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
6
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
7
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
8
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
9
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
10
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
11
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
12
reference_url https://usn.ubuntu.com/1225-1/
reference_id USN-1225-1
reference_type
scores
url https://usn.ubuntu.com/1225-1/
13
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
14
reference_url https://usn.ubuntu.com/1228-1/
reference_id USN-1228-1
reference_type
scores
url https://usn.ubuntu.com/1228-1/
15
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
16
reference_url https://usn.ubuntu.com/1246-1/
reference_id USN-1246-1
reference_type
scores
url https://usn.ubuntu.com/1246-1/
17
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-2213
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nktq-p6vq-hkgq
11
url VCID-wg43-zbfb-nfaq
vulnerability_id VCID-wg43-zbfb-nfaq
summary kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1576
reference_id
reference_type
scores
0
value 0.00777
scoring_system epss
scoring_elements 0.73574
published_at 2026-04-01T12:55:00Z
1
value 0.00777
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-02T12:55:00Z
2
value 0.00777
scoring_system epss
scoring_elements 0.73606
published_at 2026-04-04T12:55:00Z
3
value 0.00777
scoring_system epss
scoring_elements 0.73579
published_at 2026-04-07T12:55:00Z
4
value 0.00777
scoring_system epss
scoring_elements 0.73615
published_at 2026-04-08T12:55:00Z
5
value 0.00777
scoring_system epss
scoring_elements 0.73628
published_at 2026-04-09T12:55:00Z
6
value 0.00777
scoring_system epss
scoring_elements 0.7365
published_at 2026-04-11T12:55:00Z
7
value 0.00777
scoring_system epss
scoring_elements 0.73632
published_at 2026-04-12T12:55:00Z
8
value 0.00777
scoring_system epss
scoring_elements 0.73623
published_at 2026-04-13T12:55:00Z
9
value 0.00777
scoring_system epss
scoring_elements 0.73667
published_at 2026-04-16T12:55:00Z
10
value 0.00777
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-18T12:55:00Z
11
value 0.00777
scoring_system epss
scoring_elements 0.73668
published_at 2026-04-21T12:55:00Z
12
value 0.00777
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1576
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=695173
reference_id 695173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=695173
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
4
reference_url https://access.redhat.com/errata/RHSA-2011:1106
reference_id RHSA-2011:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1106
5
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
6
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
7
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
8
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
9
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
10
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
11
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
12
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
13
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
14
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
15
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1576
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq
12
url VCID-ydtx-ae9c-eqah
vulnerability_id VCID-ydtx-ae9c-eqah
summary kernel: IB/uverbs: Handle large number of entries in poll CQ
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
1
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1044
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18211
published_at 2026-04-24T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18382
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.1853
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18585
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18292
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18375
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18428
published_at 2026-04-09T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18427
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18379
published_at 2026-04-12T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18328
published_at 2026-04-13T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18272
published_at 2026-04-16T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18284
published_at 2026-04-18T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18309
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1044
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
5
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
6
reference_url http://www.securityfocus.com/bid/46488
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46488
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667916
reference_id 667916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667916
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1044
reference_id CVE-2011-1044
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1044
15
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
16
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
17
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
18
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
19
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
20
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
21
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
22
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
23
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
24
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
25
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1044
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah
13
url VCID-yevh-cfer-dud1
vulnerability_id VCID-yevh-cfer-dud1
summary kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
1
reference_url http://openwall.com/lists/oss-security/2011/02/16/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/10
2
reference_url http://openwall.com/lists/oss-security/2011/02/16/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/4
3
reference_url http://osvdb.org/70950
reference_id
reference_type
scores
url http://osvdb.org/70950
4
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0711
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17094
published_at 2026-04-24T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17162
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17327
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17375
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17154
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17245
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17303
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17317
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17268
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17208
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17147
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17153
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17189
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0711
7
reference_url https://patchwork.kernel.org/patch/555461/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/555461/
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log
9
reference_url http://www.securityfocus.com/bid/46417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46417
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=677260
reference_id 677260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=677260
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0711
reference_id CVE-2011-0711
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-0711
24
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
25
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
26
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
27
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
28
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
29
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
30
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
31
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
32
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
33
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
34
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0711
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1
14
url VCID-zumd-vknc-87ba
vulnerability_id VCID-zumd-vknc-87ba
summary kernel: IB/uverbs: Handle large number of entries in poll CQ
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
1
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4649
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-24T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21262
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21418
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21472
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21224
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21304
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21366
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21334
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21281
published_at 2026-04-13T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21275
published_at 2026-04-16T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21284
published_at 2026-04-18T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.2126
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4649
4
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
5
reference_url http://www.securityfocus.com/bid/46073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46073
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667916
reference_id 667916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667916
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4649
reference_id CVE-2010-4649
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4649
14
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
15
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
16
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
17
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
18
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
19
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
20
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
21
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
22
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
23
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
24
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4649
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5