Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-71.24.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-71.24.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1n7j-hq91-qqgy
vulnerability_id VCID-1n7j-hq91-qqgy
summary kernel: sctp: a race between ICMP protocol unreachable and connect()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4526.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4526.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4526
reference_id
reference_type
scores
0
value 0.01524
scoring_system epss
scoring_elements 0.81216
published_at 2026-04-02T12:55:00Z
1
value 0.01524
scoring_system epss
scoring_elements 0.8124
published_at 2026-04-04T12:55:00Z
2
value 0.01524
scoring_system epss
scoring_elements 0.81208
published_at 2026-04-01T12:55:00Z
3
value 0.01536
scoring_system epss
scoring_elements 0.81342
published_at 2026-04-09T12:55:00Z
4
value 0.01536
scoring_system epss
scoring_elements 0.81363
published_at 2026-04-11T12:55:00Z
5
value 0.01536
scoring_system epss
scoring_elements 0.81349
published_at 2026-04-12T12:55:00Z
6
value 0.01536
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-13T12:55:00Z
7
value 0.01536
scoring_system epss
scoring_elements 0.81379
published_at 2026-04-16T12:55:00Z
8
value 0.01536
scoring_system epss
scoring_elements 0.81381
published_at 2026-04-21T12:55:00Z
9
value 0.01536
scoring_system epss
scoring_elements 0.81404
published_at 2026-04-24T12:55:00Z
10
value 0.01536
scoring_system epss
scoring_elements 0.81411
published_at 2026-04-26T12:55:00Z
11
value 0.01536
scoring_system epss
scoring_elements 0.81415
published_at 2026-04-29T12:55:00Z
12
value 0.01536
scoring_system epss
scoring_elements 0.81309
published_at 2026-04-07T12:55:00Z
13
value 0.01536
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4526
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526
4
reference_url http://secunia.com/advisories/42964
reference_id
reference_type
scores
url http://secunia.com/advisories/42964
5
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64616
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64616
7
reference_url http://www.openwall.com/lists/oss-security/2011/01/04/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/04/13
8
reference_url http://www.openwall.com/lists/oss-security/2011/01/04/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/04/3
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0163.html
10
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/45661
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45661
12
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
13
reference_url http://www.vupen.com/english/advisories/2011/0169
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0169
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664914
reference_id 664914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664914
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4526
reference_id CVE-2010-4526
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4526
24
reference_url https://access.redhat.com/errata/RHSA-2011:0163
reference_id RHSA-2011:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0163
25
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
26
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
27
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
28
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
29
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
30
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
31
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4526
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1n7j-hq91-qqgy
1
url VCID-2v2h-1vgg-qubq
vulnerability_id VCID-2v2h-1vgg-qubq
summary kernel: install_special_mapping skips security_file_mmap check
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
1
reference_url http://openwall.com/lists/oss-security/2010/12/09/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/09/12
2
reference_url http://openwall.com/lists/oss-security/2010/12/09/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/09/13
3
reference_url http://openwall.com/lists/oss-security/2010/12/10/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/10/2
4
reference_url http://openwall.com/lists/oss-security/2010/12/10/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/10/3
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4346
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12301
published_at 2026-04-29T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12439
published_at 2026-04-21T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12445
published_at 2026-04-24T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12411
published_at 2026-04-26T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18122
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.1806
published_at 2026-04-01T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-12T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18221
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-04T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4346
7
reference_url http://secunia.com/advisories/42570
reference_id
reference_type
scores
url http://secunia.com/advisories/42570
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url https://lkml.org/lkml/2010/12/9/222
reference_id
reference_type
scores
url https://lkml.org/lkml/2010/12/9/222
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45323
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45323
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=662189
reference_id 662189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=662189
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4346
reference_id CVE-2010-4346
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4346
24
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
25
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
26
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
27
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
28
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
29
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
30
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
31
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
32
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
33
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
34
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4346
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2h-1vgg-qubq
2
url VCID-4trp-muyy-ufez
vulnerability_id VCID-4trp-muyy-ufez
summary kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url http://lkml.org/lkml/2010/9/11/170
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/11/170
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3296
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-29T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26904
published_at 2026-04-01T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26944
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.2698
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26886
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.2689
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26845
published_at 2026-04-12T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-13T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26796
published_at 2026-04-16T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26768
published_at 2026-04-18T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26729
published_at 2026-04-21T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26673
published_at 2026-04-24T12:55:00Z
14
value 0.00097
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3296
7
reference_url http://secunia.com/advisories/41440
reference_id
reference_type
scores
url http://secunia.com/advisories/41440
8
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
9
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
10
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
11
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
13
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/2
14
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/7
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/43221
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43221
18
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
21
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=633149
reference_id 633149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=633149
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3296
reference_id CVE-2010-3296
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3296
40
reference_url https://access.redhat.com/errata/RHSA-2010:0771
reference_id RHSA-2010:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0771
41
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
42
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
43
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
44
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
45
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
46
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
47
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
48
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
49
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3296
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4trp-muyy-ufez
3
url VCID-8zmc-qqfc-m7e1
vulnerability_id VCID-8zmc-qqfc-m7e1
summary kernel: deficiency in processing igmp host membership reports in br_multicast
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0716.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0716
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.2093
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21081
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21134
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20849
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20929
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.2099
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21006
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20962
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20909
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20899
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20901
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20882
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20749
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.20715
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0716
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=678169
reference_id 678169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=678169
3
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
4
reference_url https://usn.ubuntu.com/1379-1/
reference_id USN-1379-1
reference_type
scores
url https://usn.ubuntu.com/1379-1/
5
reference_url https://usn.ubuntu.com/1387-1/
reference_id USN-1387-1
reference_type
scores
url https://usn.ubuntu.com/1387-1/
6
reference_url https://usn.ubuntu.com/1394-1/
reference_id USN-1394-1
reference_type
scores
url https://usn.ubuntu.com/1394-1/
fixed_packages
aliases CVE-2011-0716
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zmc-qqfc-m7e1
4
url VCID-ccy6-xxzm-vbb4
vulnerability_id VCID-ccy6-xxzm-vbb4
summary kernel: iowarrior usb device heap overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4656
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14881
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14929
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15006
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14811
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.149
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.1495
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14915
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14877
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14818
published_at 2026-04-24T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14714
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14722
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14781
published_at 2026-04-21T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14817
published_at 2026-04-26T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.14762
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4656
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672420
reference_id 672420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672420
3
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
4
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
5
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
10
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
11
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4656
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccy6-xxzm-vbb4
5
url VCID-dg9k-nfvc-k7en
vulnerability_id VCID-dg9k-nfvc-k7en
summary kernel: orinoco: fix TKIP countermeasure behaviour
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4648
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45526
published_at 2026-04-01T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45602
published_at 2026-04-02T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45622
published_at 2026-04-04T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45569
published_at 2026-04-07T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45624
published_at 2026-04-13T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45623
published_at 2026-04-09T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45646
published_at 2026-04-11T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45616
published_at 2026-04-12T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45674
published_at 2026-04-16T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.4567
published_at 2026-04-18T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45619
published_at 2026-04-21T12:55:00Z
11
value 0.00228
scoring_system epss
scoring_elements 0.45532
published_at 2026-04-24T12:55:00Z
12
value 0.00228
scoring_system epss
scoring_elements 0.4554
published_at 2026-04-26T12:55:00Z
13
value 0.00228
scoring_system epss
scoring_elements 0.4548
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667907
reference_id 667907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667907
3
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
4
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
5
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
6
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
7
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
8
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
9
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4648
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dg9k-nfvc-k7en
6
url VCID-gwyq-wkdy-5fba
vulnerability_id VCID-gwyq-wkdy-5fba
summary kernel: s390 task_show_regs infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98
1
reference_url http://openwall.com/lists/oss-security/2011/02/16/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/3
2
reference_url http://openwall.com/lists/oss-security/2011/02/16/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/16/9
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0710.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0710.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0710
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28701
published_at 2026-04-29T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29094
published_at 2026-04-08T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29168
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29219
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29031
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29136
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29142
published_at 2026-04-11T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29097
published_at 2026-04-12T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29045
published_at 2026-04-13T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29074
published_at 2026-04-16T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.2905
published_at 2026-04-18T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29005
published_at 2026-04-21T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.28885
published_at 2026-04-24T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.28772
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0710
5
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65464
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65464
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2
8
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/46421
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46421
10
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=677850
reference_id 677850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=677850
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0710
reference_id CVE-2011-0710
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-0710
18
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
19
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
fixed_packages
aliases CVE-2011-0710
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwyq-wkdy-5fba
7
url VCID-h9a4-7v2b-9kg2
vulnerability_id VCID-h9a4-7v2b-9kg2
summary kernel: gro: reset dev and skb_iff on skb reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1478
reference_id
reference_type
scores
0
value 0.00911
scoring_system epss
scoring_elements 0.75759
published_at 2026-04-01T12:55:00Z
1
value 0.00911
scoring_system epss
scoring_elements 0.75762
published_at 2026-04-02T12:55:00Z
2
value 0.00911
scoring_system epss
scoring_elements 0.75795
published_at 2026-04-04T12:55:00Z
3
value 0.00911
scoring_system epss
scoring_elements 0.75773
published_at 2026-04-07T12:55:00Z
4
value 0.00911
scoring_system epss
scoring_elements 0.75806
published_at 2026-04-08T12:55:00Z
5
value 0.00911
scoring_system epss
scoring_elements 0.75818
published_at 2026-04-09T12:55:00Z
6
value 0.00911
scoring_system epss
scoring_elements 0.75842
published_at 2026-04-11T12:55:00Z
7
value 0.00911
scoring_system epss
scoring_elements 0.75823
published_at 2026-04-12T12:55:00Z
8
value 0.00911
scoring_system epss
scoring_elements 0.75817
published_at 2026-04-13T12:55:00Z
9
value 0.00911
scoring_system epss
scoring_elements 0.75854
published_at 2026-04-16T12:55:00Z
10
value 0.00911
scoring_system epss
scoring_elements 0.75858
published_at 2026-04-18T12:55:00Z
11
value 0.00911
scoring_system epss
scoring_elements 0.75843
published_at 2026-04-21T12:55:00Z
12
value 0.00911
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-24T12:55:00Z
13
value 0.00911
scoring_system epss
scoring_elements 0.7589
published_at 2026-04-26T12:55:00Z
14
value 0.00911
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=691270
reference_id 691270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=691270
3
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
4
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
5
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
10
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
11
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
12
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
13
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
fixed_packages
aliases CVE-2011-1478
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9a4-7v2b-9kg2
8
url VCID-ku5j-hkct-aug2
vulnerability_id VCID-ku5j-hkct-aug2
summary kernel: panic in ib_cm:cm_work_handler
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63335
published_at 2026-04-29T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63193
published_at 2026-04-01T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63253
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63282
published_at 2026-04-04T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63247
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63316
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63317
published_at 2026-04-16T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63281
published_at 2026-04-13T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63325
published_at 2026-04-18T12:55:00Z
11
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-21T12:55:00Z
12
value 0.00442
scoring_system epss
scoring_elements 0.63324
published_at 2026-04-24T12:55:00Z
13
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
3
reference_url http://secunia.com/advisories/43693
reference_id
reference_type
scores
url http://secunia.com/advisories/43693
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
5
reference_url http://www.openwall.com/lists/oss-security/2011/03/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/03/11/1
6
reference_url http://www.securityfocus.com/bid/46839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46839
7
reference_url http://www.spinics.net/lists/linux-rdma/msg07447.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07447.html
8
reference_url http://www.spinics.net/lists/linux-rdma/msg07448.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07448.html
9
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=653648
reference_id 653648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=653648
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
reference_id CVE-2011-0695
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
19
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
20
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
21
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
22
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
23
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
24
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
25
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
28
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0695
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2
9
url VCID-uxye-sz24-dqd4
vulnerability_id VCID-uxye-sz24-dqd4
summary kernel: av7110 negative array offset
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
1
reference_url http://openwall.com/lists/oss-security/2011/01/24/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/24/2
2
reference_url http://openwall.com/lists/oss-security/2011/01/25/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/25/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-29T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17202
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.1737
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17416
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17196
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17359
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.1731
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17251
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17191
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17198
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17231
published_at 2026-04-21T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17136
published_at 2026-04-24T12:55:00Z
14
value 0.00055
scoring_system epss
scoring_elements 0.17116
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
5
reference_url http://secunia.com/advisories/43009
reference_id
reference_type
scores
url http://secunia.com/advisories/43009
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
9
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/45986
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45986
11
reference_url http://www.securitytracker.com/id?1025195
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025195
12
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672398
reference_id 672398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672398
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
reference_id CVE-2011-0521
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
18
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
19
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
20
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
21
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
22
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
23
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
24
reference_url https://usn.ubuntu.com/1133-1/
reference_id USN-1133-1
reference_type
scores
url https://usn.ubuntu.com/1133-1/
25
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
28
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
29
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0521
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxye-sz24-dqd4
10
url VCID-xr4s-smmp-fubc
vulnerability_id VCID-xr4s-smmp-fubc
summary kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16642
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16814
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16872
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16656
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16741
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16795
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16774
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1673
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16672
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16609
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16616
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16655
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16558
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16547
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16514
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672428
reference_id 672428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672428
3
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
4
reference_url https://access.redhat.com/errata/RHSA-2011:0303
reference_id RHSA-2011:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0303
5
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
6
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
7
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
8
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
9
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
10
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
11
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
12
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4655
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4s-smmp-fubc
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.24.1%3Farch=el6