Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127125?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127125?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-131.12.1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87375?format=api", "vulnerability_id": "VCID-58bv-cjnr-3fdh", "summary": "kernel: ksm: race between ksmd and exiting task", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31221", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31192", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3088", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=710338", "reference_id": "710338", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710338" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35820.c", "reference_id": "CVE-2011-2183;OSVDB-74680", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35820.c" }, { "reference_url": "https://www.securityfocus.com/bid/48101/info", "reference_id": "CVE-2011-2183;OSVDB-74680", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/48101/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1244-1/", "reference_id": "USN-1244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1244-1/" }, { "reference_url": "https://usn.ubuntu.com/1272-1/", "reference_id": "USN-1272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1272-1/" }, { "reference_url": "https://usn.ubuntu.com/1278-1/", "reference_id": "USN-1278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1278-1/" }, { "reference_url": "https://usn.ubuntu.com/1279-1/", "reference_id": "USN-1279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1279-1/" }, { "reference_url": "https://usn.ubuntu.com/1281-1/", "reference_id": "USN-1281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1281-1/" }, { "reference_url": "https://usn.ubuntu.com/1285-1/", "reference_id": "USN-1285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1285-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2183" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-58bv-cjnr-3fdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87386?format=api", "vulnerability_id": "VCID-5mpc-pasz-x3hd", "summary": "kernel: nl80211: missing check for valid SSID size in scan operations", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2517.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2517.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30237", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30267", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30139", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30091", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29905", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2517" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152", "reference_id": "718152", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1212", "reference_id": "RHSA-2011:1212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1813", "reference_id": "RHSA-2011:1813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1813" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1244-1/", "reference_id": "USN-1244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1244-1/" }, { "reference_url": "https://usn.ubuntu.com/1269-1/", "reference_id": "USN-1269-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1269-1/" }, { "reference_url": "https://usn.ubuntu.com/1272-1/", "reference_id": "USN-1272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1272-1/" }, { "reference_url": "https://usn.ubuntu.com/1274-1/", "reference_id": "USN-1274-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1274-1/" }, { "reference_url": "https://usn.ubuntu.com/1278-1/", "reference_id": "USN-1278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1278-1/" }, { "reference_url": "https://usn.ubuntu.com/1279-1/", "reference_id": "USN-1279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1279-1/" }, { "reference_url": "https://usn.ubuntu.com/1281-1/", "reference_id": "USN-1281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1281-1/" }, { "reference_url": "https://usn.ubuntu.com/1285-1/", "reference_id": "USN-1285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1285-1/" }, { "reference_url": "https://usn.ubuntu.com/1286-1/", "reference_id": "USN-1286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1286-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2517" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5mpc-pasz-x3hd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87392?format=api", "vulnerability_id": "VCID-a9mu-gdgc-cbct", "summary": "kernel: validate size of EFI GUID partition entries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1844", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18349", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18385", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18329", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18269", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18255", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1776" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026", "reference_id": "703026", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1225-1/", "reference_id": "USN-1225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1225-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1776" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9mu-gdgc-cbct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87390?format=api", "vulnerability_id": "VCID-au4y-xz41-zyfy", "summary": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17377", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1732", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17328", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17359", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17246", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019", "reference_id": "703019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1189-1/", "reference_id": "USN-1189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1189-1/" }, { "reference_url": "https://usn.ubuntu.com/1201-1/", "reference_id": "USN-1201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1201-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1205-1/", "reference_id": "USN-1205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1205-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1211-1/", "reference_id": "USN-1211-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1211-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2492" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-au4y-xz41-zyfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87350?format=api", "vulnerability_id": "VCID-c551-3re3-xfat", "summary": "kernel: bluetooth: buffer overflow in l2cap config request", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86025", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86052", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86082", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86096", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86089", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86125", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02792", "scoring_system": "epss", "scoring_elements": "0.86135", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2497" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=716805", "reference_id": "716805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1225-1/", "reference_id": "USN-1225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1225-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1239-1/", "reference_id": "USN-1239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1239-1/" }, { "reference_url": "https://usn.ubuntu.com/1240-1/", "reference_id": "USN-1240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1240-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1245-1/", "reference_id": "USN-1245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1245-1/" }, { "reference_url": "https://usn.ubuntu.com/1246-1/", "reference_id": "USN-1246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1246-1/" }, { "reference_url": "https://usn.ubuntu.com/1253-1/", "reference_id": "USN-1253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1253-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2497" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c551-3re3-xfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87442?format=api", "vulnerability_id": "VCID-dd7k-u8ev-abhz", "summary": "kernel signal spoofing issue", "references": [ { "reference_url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23351", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23601", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23663", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1182" }, { "reference_url": "https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/03/23/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/03/23/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028", "reference_id": "690028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182", "reference_id": "CVE-2011-1182", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0883", "reference_id": "RHSA-2011:0883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1182" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dd7k-u8ev-abhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87421?format=api", "vulnerability_id": "VCID-j67y-7adf-3ygp", "summary": "kernel: proc: signedness issue in next_pidmap()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1" }, { "reference_url": "http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source", "reference_id": "", "reference_type": "", "scores": [], "url": "http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/19/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/19/1" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/20/1" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12528", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12658", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12641", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12609", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12438", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1256", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1593" }, { "reference_url": "http://secunia.com/advisories/44164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44164" }, { "reference_url": "http://securitytracker.com/id?1025420", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025420" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66876", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66876" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4" }, { "reference_url": "http://www.securityfocus.com/bid/47497", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47497" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1146-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1146-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822", "reference_id": "697822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593", "reference_id": "CVE-2011-1593", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1146-1/", "reference_id": "USN-1146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1146-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1593" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j67y-7adf-3ygp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87374?format=api", "vulnerability_id": "VCID-krvj-487p-auep", "summary": "kernel: ext4: kernel panic when writing data to the last block of sparse file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20957", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.21016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2081", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2076", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20642", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20637", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2695" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722557", "reference_id": "722557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1386", "reference_id": "RHSA-2011:1386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1386" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1239-1/", "reference_id": "USN-1239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1239-1/" }, { "reference_url": "https://usn.ubuntu.com/1240-1/", "reference_id": "USN-1240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1240-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1242-1/", "reference_id": "USN-1242-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1242-1/" }, { "reference_url": "https://usn.ubuntu.com/1243-1/", "reference_id": "USN-1243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1243-1/" }, { "reference_url": "https://usn.ubuntu.com/1244-1/", "reference_id": "USN-1244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1244-1/" }, { "reference_url": "https://usn.ubuntu.com/1245-1/", "reference_id": "USN-1245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1245-1/" }, { "reference_url": "https://usn.ubuntu.com/1246-1/", "reference_id": "USN-1246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1246-1/" }, { "reference_url": "https://usn.ubuntu.com/1253-1/", "reference_id": "USN-1253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1253-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2695" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krvj-487p-auep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87376?format=api", "vulnerability_id": "VCID-nktq-p6vq-hkgq", "summary": "kernel: inet_diag: insufficient validation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19617", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19523", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19426", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2213" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536", "reference_id": "714536", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1225-1/", "reference_id": "USN-1225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1225-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1246-1/", "reference_id": "USN-1246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1246-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2213" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nktq-p6vq-hkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87380?format=api", "vulnerability_id": "VCID-s48v-g94e-jkb9", "summary": "kernel: rpc task leak after flock()ing NFS share", "references": [ { "reference_url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20637", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20957", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.21016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2081", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2076", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20642", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2491" }, { "reference_url": "https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/06/23/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/06/23/6" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393", "reference_id": "709393", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491", "reference_id": "CVE-2011-2491", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1212", "reference_id": "RHSA-2011:1212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1813", "reference_id": "RHSA-2011:1813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1813" }, { "reference_url": "https://usn.ubuntu.com/1244-1/", "reference_id": "USN-1244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1244-1/" }, { "reference_url": "https://usn.ubuntu.com/1268-1/", "reference_id": "USN-1268-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1268-1/" }, { "reference_url": "https://usn.ubuntu.com/1269-1/", "reference_id": "USN-1269-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1269-1/" }, { "reference_url": "https://usn.ubuntu.com/1271-1/", "reference_id": "USN-1271-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1271-1/" }, { "reference_url": "https://usn.ubuntu.com/1272-1/", "reference_id": "USN-1272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1272-1/" }, { "reference_url": "https://usn.ubuntu.com/1274-1/", "reference_id": "USN-1274-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1274-1/" }, { "reference_url": "https://usn.ubuntu.com/1278-1/", "reference_id": "USN-1278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1278-1/" }, { "reference_url": "https://usn.ubuntu.com/1279-1/", "reference_id": "USN-1279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1279-1/" }, { "reference_url": "https://usn.ubuntu.com/1281-1/", "reference_id": "USN-1281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1281-1/" }, { "reference_url": "https://usn.ubuntu.com/1285-1/", "reference_id": "USN-1285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1285-1/" }, { "reference_url": "https://usn.ubuntu.com/1286-1/", "reference_id": "USN-1286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1286-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2491" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s48v-g94e-jkb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3877?format=api", "vulnerability_id": "VCID-s74x-nvav-rud6", "summary": "VT-d (PCI passthrough) MSI trap injection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1898.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69889", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69946", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69969", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69953", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.6994", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69993", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69975", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.70025", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.70034", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=715555", "reference_id": "715555", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=715555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1479", "reference_id": "RHSA-2011:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0358", "reference_id": "RHSA-2012:0358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0358" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-3.html", "reference_id": "XSA-3", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-3.html" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1898" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s74x-nvav-rud6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87405?format=api", "vulnerability_id": "VCID-ssru-1x3c-4qch", "summary": "kernel: gfs2: make sure fallocate bytes is a multiple of blksize", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2689.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2689.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2689", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26528", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26577", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26487", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26422", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26354", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2689" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=720861", "reference_id": "720861", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1065", "reference_id": "RHSA-2011:1065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://usn.ubuntu.com/1211-1/", "reference_id": "USN-1211-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1211-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2689" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssru-1x3c-4qch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87353?format=api", "vulnerability_id": "VCID-st8n-ewcq-tqd8", "summary": "kernel: /proc/PID/io infoleak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2495.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22844", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22889", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22752", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22535", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2495" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825", "reference_id": "716825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1212", "reference_id": "RHSA-2011:1212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1813", "reference_id": "RHSA-2011:1813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1813" }, { "reference_url": "https://usn.ubuntu.com/1236-1/", "reference_id": "USN-1236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1236-1/" }, { "reference_url": "https://usn.ubuntu.com/1239-1/", "reference_id": "USN-1239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1239-1/" }, { "reference_url": "https://usn.ubuntu.com/1240-1/", "reference_id": "USN-1240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1240-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1242-1/", "reference_id": "USN-1242-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1242-1/" }, { "reference_url": "https://usn.ubuntu.com/1243-1/", "reference_id": "USN-1243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1243-1/" }, { "reference_url": "https://usn.ubuntu.com/1244-1/", "reference_id": "USN-1244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1244-1/" }, { "reference_url": "https://usn.ubuntu.com/1245-1/", "reference_id": "USN-1245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1245-1/" }, { "reference_url": "https://usn.ubuntu.com/1253-1/", "reference_id": "USN-1253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1253-1/" }, { "reference_url": "https://usn.ubuntu.com/1279-1/", "reference_id": "USN-1279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1279-1/" }, { "reference_url": "https://usn.ubuntu.com/1281-1/", "reference_id": "USN-1281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1281-1/" }, { "reference_url": "https://usn.ubuntu.com/1285-1/", "reference_id": "USN-1285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1285-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2495" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-st8n-ewcq-tqd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87373?format=api", "vulnerability_id": "VCID-wg43-zbfb-nfaq", "summary": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73574", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.7365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73701", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73711", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173", "reference_id": "695173", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1106", "reference_id": "RHSA-2011:1106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1239-1/", "reference_id": "USN-1239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1239-1/" }, { "reference_url": "https://usn.ubuntu.com/1240-1/", "reference_id": "USN-1240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1240-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1245-1/", "reference_id": "USN-1245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1245-1/" }, { "reference_url": "https://usn.ubuntu.com/1253-1/", "reference_id": "USN-1253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1253-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1576" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq" } ], "fixing_vulnerabilities": [], "risk_score": "2.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.12.1%3Farch=el6" }