Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.64?arch=el5rt
Typerpm
Namespaceredhat
Namekernel-rt
Version2.6.33.9-rt31.64
Qualifiers
arch el5rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4qtb-f8h1-6ybn
vulnerability_id VCID-4qtb-f8h1-6ybn
summary kernel: potential kernel deadlock when creating circular epoll file structures
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
1
reference_url http://openwall.com/lists/oss-security/2011/03/02/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/02/1
2
reference_url http://openwall.com/lists/oss-security/2011/03/02/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/02/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1082.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1082.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1082
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42343
published_at 2026-04-26T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42403
published_at 2026-04-01T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42473
published_at 2026-04-02T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42502
published_at 2026-04-04T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42441
published_at 2026-04-07T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42491
published_at 2026-04-08T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42501
published_at 2026-04-09T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42524
published_at 2026-04-11T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42486
published_at 2026-04-12T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42456
published_at 2026-04-13T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42506
published_at 2026-04-16T12:55:00Z
11
value 0.00203
scoring_system epss
scoring_elements 0.42481
published_at 2026-04-18T12:55:00Z
12
value 0.00203
scoring_system epss
scoring_elements 0.4241
published_at 2026-04-21T12:55:00Z
13
value 0.00203
scoring_system epss
scoring_elements 0.42346
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1082
5
reference_url https://lkml.org/lkml/2011/2/5/220
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/2/5/220
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681575
reference_id 681575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681575
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1082
reference_id CVE-2011-1082
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1082
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35404.c
reference_id CVE-2011-1082;OSVDB-73053
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35404.c
11
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
12
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
13
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
14
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
15
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
16
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
17
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
18
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
19
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1082
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qtb-f8h1-6ybn
1
url VCID-75ba-49cu-zuaj
vulnerability_id VCID-75ba-49cu-zuaj
summary kernel: ebtables stack infoleak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1080
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2267
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22844
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22889
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22682
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22757
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22808
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.2283
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22792
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22735
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22752
published_at 2026-04-16T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31777
published_at 2026-04-18T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31747
published_at 2026-04-21T12:55:00Z
12
value 0.00125
scoring_system epss
scoring_elements 0.31579
published_at 2026-04-24T12:55:00Z
13
value 0.00125
scoring_system epss
scoring_elements 0.31451
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1080
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681262
reference_id 681262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681262
3
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
4
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1080
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75ba-49cu-zuaj
2
url VCID-b5ab-aade-4kfw
vulnerability_id VCID-b5ab-aade-4kfw
summary kernel: proc: protect mm start_code/end_code in /proc/pid/stat
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0726
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22414
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22582
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22624
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22411
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22492
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22524
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.2247
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22485
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22432
published_at 2026-04-21T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22278
published_at 2026-04-24T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22264
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0726
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=684569
reference_id 684569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=684569
3
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
4
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
13
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-0726
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ab-aade-4kfw
3
url VCID-gyye-vwnb-6qeg
vulnerability_id VCID-gyye-vwnb-6qeg
summary kernel: drm_modeset_ctl signedness issue
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1013
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26424
published_at 2026-04-26T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26656
published_at 2026-04-01T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26703
published_at 2026-04-02T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-04T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2653
published_at 2026-04-18T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26598
published_at 2026-04-08T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26648
published_at 2026-04-09T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26653
published_at 2026-04-11T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26608
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.2655
published_at 2026-04-13T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26558
published_at 2026-04-16T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26492
published_at 2026-04-21T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.2643
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1013
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/67199
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/67199
4
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
5
reference_url http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c
reference_id
reference_type
scores
url http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c
6
reference_url http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h
reference_id
reference_type
scores
url http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h
7
reference_url http://www.securityfocus.com/bid/47639
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47639
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=679925
reference_id 679925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=679925
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1013
reference_id CVE-2011-1013
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1013
12
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
13
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
14
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
15
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
16
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
17
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
18
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
19
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
20
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1013
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyye-vwnb-6qeg
4
url VCID-ku5j-hkct-aug2
vulnerability_id VCID-ku5j-hkct-aug2
summary kernel: panic in ib_cm:cm_work_handler
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-26T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63193
published_at 2026-04-01T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63253
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63282
published_at 2026-04-04T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63247
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63316
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63317
published_at 2026-04-16T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63281
published_at 2026-04-13T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63325
published_at 2026-04-18T12:55:00Z
11
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-21T12:55:00Z
12
value 0.00442
scoring_system epss
scoring_elements 0.63324
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
3
reference_url http://secunia.com/advisories/43693
reference_id
reference_type
scores
url http://secunia.com/advisories/43693
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
5
reference_url http://www.openwall.com/lists/oss-security/2011/03/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/03/11/1
6
reference_url http://www.securityfocus.com/bid/46839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46839
7
reference_url http://www.spinics.net/lists/linux-rdma/msg07447.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07447.html
8
reference_url http://www.spinics.net/lists/linux-rdma/msg07448.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07448.html
9
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=653648
reference_id 653648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=653648
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
reference_id CVE-2011-0695
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
19
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
20
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
21
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
22
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
23
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
24
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
25
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
28
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0695
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2
5
url VCID-p45k-2b85-9ydy
vulnerability_id VCID-p45k-2b85-9ydy
summary kernel: fs/partitions: Corrupted OSF partition table infoleak
references
0
reference_url http://downloads.avaya.com/css/P8/documents/100145416
reference_id
reference_type
scores
url http://downloads.avaya.com/css/P8/documents/100145416
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
3
reference_url http://openwall.com/lists/oss-security/2011/03/15/14
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/15/14
4
reference_url http://openwall.com/lists/oss-security/2011/03/15/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/15/9
5
reference_url http://rhn.redhat.com/errata/RHSA-2011-0833.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0833.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1163.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1163
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28816
published_at 2026-04-26T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29139
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29213
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29266
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.2908
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29143
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29185
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29191
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29145
published_at 2026-04-12T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29092
published_at 2026-04-13T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29119
published_at 2026-04-16T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29096
published_at 2026-04-18T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29049
published_at 2026-04-21T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.28929
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1163
8
reference_url http://securityreason.com/securityalert/8189
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8189
9
reference_url http://securitytracker.com/id?1025225
reference_id
reference_type
scores
url http://securitytracker.com/id?1025225
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
11
reference_url http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt
reference_id
reference_type
scores
url http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt
12
reference_url http://www.securityfocus.com/archive/1/517050
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517050
13
reference_url http://www.securityfocus.com/bid/46878
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46878
14
reference_url http://www.spinics.net/lists/mm-commits/msg82737.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/mm-commits/msg82737.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=688021
reference_id 688021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=688021
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1163
reference_id CVE-2011-1163
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1163
27
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
28
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
29
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
30
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
31
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
32
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
33
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
34
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
35
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
36
reference_url https://usn.ubuntu.com/1183-1/
reference_id USN-1183-1
reference_type
scores
url https://usn.ubuntu.com/1183-1/
37
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
38
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
39
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1163
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p45k-2b85-9ydy
6
url VCID-paxh-r3cd-cfdu
vulnerability_id VCID-paxh-r3cd-cfdu
summary kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN
references
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1019
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22749
published_at 2026-04-26T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22894
published_at 2026-04-01T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23064
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23109
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.229
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22972
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23025
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23044
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23007
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22952
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22967
published_at 2026-04-16T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.2296
published_at 2026-04-18T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22924
published_at 2026-04-21T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1019
4
reference_url https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b
5
reference_url http://www.openwall.com/lists/oss-security/2011/02/25/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/25/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=680360
reference_id 680360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=680360
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1019
reference_id CVE-2011-1019
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1019
9
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
10
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
11
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
12
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
13
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
14
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
15
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
16
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-1019
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-paxh-r3cd-cfdu
7
url VCID-phc7-fgab-sua4
vulnerability_id VCID-phc7-fgab-sua4
summary kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1170.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1170.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1170
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24753
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2483
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.2464
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24709
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24769
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24728
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24671
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24684
published_at 2026-04-16T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24677
published_at 2026-04-18T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24657
published_at 2026-04-21T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.246
published_at 2026-04-24T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24588
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1170
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=689321
reference_id 689321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=689321
3
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
4
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
7
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
8
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
9
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
10
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
11
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
12
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
13
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
14
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
15
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
16
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1170
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-phc7-fgab-sua4
8
url VCID-qtdb-h1kj-yybt
vulnerability_id VCID-qtdb-h1kj-yybt
summary kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1172
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.2471
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24788
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24601
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.2467
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24718
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.2469
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24633
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24646
published_at 2026-04-16T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24635
published_at 2026-04-18T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24612
published_at 2026-04-21T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-24T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24543
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1172
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=689345
reference_id 689345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=689345
3
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
4
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
7
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
8
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
9
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
10
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
11
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
12
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
13
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
14
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
15
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
16
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1172
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtdb-h1kj-yybt
9
url VCID-rg3q-bcnw-1fdy
vulnerability_id VCID-rg3q-bcnw-1fdy
summary kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1171.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1171
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24753
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2483
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.2464
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24709
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24769
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24728
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24671
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24684
published_at 2026-04-16T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24677
published_at 2026-04-18T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24657
published_at 2026-04-21T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.246
published_at 2026-04-24T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24588
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1171
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=689327
reference_id 689327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=689327
3
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
4
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
7
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
8
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
9
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
10
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
11
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
12
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
13
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
14
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
15
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
16
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
fixed_packages
aliases CVE-2011-1171
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg3q-bcnw-1fdy
10
url VCID-rh8x-5dz8-tbd6
vulnerability_id VCID-rh8x-5dz8-tbd6
summary kernel: bnep device field missing NULL terminator
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1079
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18784
published_at 2026-04-18T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18802
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18689
published_at 2026-04-24T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18668
published_at 2026-04-26T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.30072
published_at 2026-04-08T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-09T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.30112
published_at 2026-04-11T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.30114
published_at 2026-04-01T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.3002
published_at 2026-04-13T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.30036
published_at 2026-04-16T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.30069
published_at 2026-04-12T12:55:00Z
11
value 0.00114
scoring_system epss
scoring_elements 0.30152
published_at 2026-04-02T12:55:00Z
12
value 0.00114
scoring_system epss
scoring_elements 0.30199
published_at 2026-04-04T12:55:00Z
13
value 0.00114
scoring_system epss
scoring_elements 0.30013
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1079
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681260
reference_id 681260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681260
3
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
4
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1079
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rh8x-5dz8-tbd6
11
url VCID-wye8-98he-4bcv
vulnerability_id VCID-wye8-98he-4bcv
summary kernel: fs/partitions: Validate map_count in Mac partition tables
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed
1
reference_url http://openwall.com/lists/oss-security/2011/02/22/11
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/22/11
2
reference_url http://openwall.com/lists/oss-security/2011/02/22/15
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/22/15
3
reference_url http://openwall.com/lists/oss-security/2011/02/22/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/22/3
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1010.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1010.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1010
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12029
published_at 2026-04-26T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12069
published_at 2026-04-01T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.1218
published_at 2026-04-02T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-04T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12027
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1216
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12168
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12131
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12098
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1197
published_at 2026-04-16T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.11967
published_at 2026-04-18T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12084
published_at 2026-04-21T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12061
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1010
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url http://securityreason.com/securityalert/8115
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8115
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65643
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65643
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37.2
10
reference_url http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt
reference_id
reference_type
scores
url http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt
11
reference_url http://www.securityfocus.com/archive/1/516615/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516615/100/0/threaded
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/46492
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46492
14
reference_url http://www.securitytracker.com/id?1025126
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025126
15
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=679282
reference_id 679282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=679282
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1010
reference_id CVE-2011-1010
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1010
19
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
20
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
21
reference_url https://access.redhat.com/errata/RHSA-2011:0542
reference_id RHSA-2011:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0542
22
reference_url https://access.redhat.com/errata/RHSA-2011:0883
reference_id RHSA-2011:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0883
23
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
24
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
25
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
26
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
27
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
28
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
29
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1010
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wye8-98he-4bcv
12
url VCID-yevh-cfer-dud1
vulnerability_id VCID-yevh-cfer-dud1
summary kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
1
reference_url http://openwall.com/lists/oss-security/2011/02/16/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/10
2
reference_url http://openwall.com/lists/oss-security/2011/02/16/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/4
3
reference_url http://osvdb.org/70950
reference_id
reference_type
scores
url http://osvdb.org/70950
4
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0711
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17076
published_at 2026-04-26T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17162
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17327
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17375
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17154
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17245
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17303
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17317
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17268
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17208
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17147
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17153
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17189
published_at 2026-04-21T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17094
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0711
7
reference_url https://patchwork.kernel.org/patch/555461/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/555461/
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log
9
reference_url http://www.securityfocus.com/bid/46417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46417
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=677260
reference_id 677260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=677260
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0711
reference_id CVE-2011-0711
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-0711
24
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
25
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
26
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
27
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
28
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
29
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
30
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
31
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
32
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
33
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
34
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0711
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1
13
url VCID-ytng-8j5w-17ea
vulnerability_id VCID-ytng-8j5w-17ea
summary kernel: bt sco_conninfo infoleak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1078.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1078
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11348
published_at 2026-04-18T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11472
published_at 2026-04-21T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11425
published_at 2026-04-24T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11383
published_at 2026-04-26T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15401
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15451
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15412
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15402
published_at 2026-04-01T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15307
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15224
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15373
published_at 2026-04-12T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15443
published_at 2026-04-02T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15512
published_at 2026-04-04T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15313
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1078
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681259
reference_id 681259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681259
3
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
4
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
5
reference_url https://access.redhat.com/errata/RHSA-2012:1156
reference_id RHSA-2012:1156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1156
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
11
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
12
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
13
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
14
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
15
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
16
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1078
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytng-8j5w-17ea
14
url VCID-zedv-xfpx-effg
vulnerability_id VCID-zedv-xfpx-effg
summary kernel: dccp: fix oops on Reset after close
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1093
reference_id
reference_type
scores
0
value 0.01222
scoring_system epss
scoring_elements 0.79041
published_at 2026-04-01T12:55:00Z
1
value 0.01222
scoring_system epss
scoring_elements 0.79048
published_at 2026-04-02T12:55:00Z
2
value 0.01222
scoring_system epss
scoring_elements 0.79074
published_at 2026-04-04T12:55:00Z
3
value 0.01222
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-07T12:55:00Z
4
value 0.01222
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-08T12:55:00Z
5
value 0.01222
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-09T12:55:00Z
6
value 0.01222
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-21T12:55:00Z
7
value 0.01222
scoring_system epss
scoring_elements 0.79101
published_at 2026-04-12T12:55:00Z
8
value 0.01222
scoring_system epss
scoring_elements 0.79092
published_at 2026-04-13T12:55:00Z
9
value 0.01222
scoring_system epss
scoring_elements 0.79119
published_at 2026-04-16T12:55:00Z
10
value 0.01222
scoring_system epss
scoring_elements 0.79117
published_at 2026-04-18T12:55:00Z
11
value 0.01222
scoring_system epss
scoring_elements 0.79148
published_at 2026-04-24T12:55:00Z
12
value 0.01222
scoring_system epss
scoring_elements 0.79155
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1093
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=682954
reference_id 682954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=682954
3
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
4
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
5
reference_url https://access.redhat.com/errata/RHSA-2011:0833
reference_id RHSA-2011:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0833
6
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
7
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
10
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
11
reference_url https://usn.ubuntu.com/1189-1/
reference_id USN-1189-1
reference_type
scores
url https://usn.ubuntu.com/1189-1/
12
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
13
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
14
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1093
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zedv-xfpx-effg
Fixing_vulnerabilities
Risk_score8.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.64%3Farch=el5rt