Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.9-100?arch=EL
Typerpm
Namespaceredhat
Namekernel
Version2.6.9-100
Qualifiers
arch EL
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-mbz2-9g8q-u7e5
vulnerability_id VCID-mbz2-9g8q-u7e5
summary kernel: buffer overflow in OSS load_mixer_volumes
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
2
reference_url http://openwall.com/lists/oss-security/2010/12/31/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/31/1
3
reference_url http://openwall.com/lists/oss-security/2010/12/31/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/31/4
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4527.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4527
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15273
published_at 2026-04-29T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15411
published_at 2026-04-01T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15451
published_at 2026-04-02T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15521
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15321
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15409
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15459
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15421
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15381
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15316
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15233
published_at 2026-04-16T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15238
published_at 2026-04-18T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.1529
published_at 2026-04-21T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.1533
published_at 2026-04-24T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15328
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4527
6
reference_url http://secunia.com/advisories/42765
reference_id
reference_type
scores
url http://secunia.com/advisories/42765
7
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
9
reference_url http://www.securityfocus.com/bid/45629
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45629
10
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
11
reference_url http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667615
reference_id 667615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667615
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4527
reference_id CVE-2010-4527
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4527
15
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
16
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
17
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
18
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
19
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
20
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
21
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
22
reference_url https://usn.ubuntu.com/1133-1/
reference_id USN-1133-1
reference_type
scores
url https://usn.ubuntu.com/1133-1/
23
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
24
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4527
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbz2-9g8q-u7e5
1
url VCID-uxye-sz24-dqd4
vulnerability_id VCID-uxye-sz24-dqd4
summary kernel: av7110 negative array offset
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
1
reference_url http://openwall.com/lists/oss-security/2011/01/24/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/24/2
2
reference_url http://openwall.com/lists/oss-security/2011/01/25/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/25/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-29T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17202
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.1737
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17416
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17196
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17359
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.1731
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17251
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17191
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17198
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17231
published_at 2026-04-21T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17136
published_at 2026-04-24T12:55:00Z
14
value 0.00055
scoring_system epss
scoring_elements 0.17116
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
5
reference_url http://secunia.com/advisories/43009
reference_id
reference_type
scores
url http://secunia.com/advisories/43009
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
9
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/45986
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45986
11
reference_url http://www.securitytracker.com/id?1025195
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025195
12
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672398
reference_id 672398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672398
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
reference_id CVE-2011-0521
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
18
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
19
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
20
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
21
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
22
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
23
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
24
reference_url https://usn.ubuntu.com/1133-1/
reference_id USN-1133-1
reference_type
scores
url https://usn.ubuntu.com/1133-1/
25
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
28
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
29
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0521
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxye-sz24-dqd4
2
url VCID-xr4s-smmp-fubc
vulnerability_id VCID-xr4s-smmp-fubc
summary kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16642
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16814
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16872
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16656
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16741
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16795
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16774
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1673
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16672
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16609
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16616
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16655
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16558
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16547
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16514
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672428
reference_id 672428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672428
3
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
4
reference_url https://access.redhat.com/errata/RHSA-2011:0303
reference_id RHSA-2011:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0303
5
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
6
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
7
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
8
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
9
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
10
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
11
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
12
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4655
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4s-smmp-fubc
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-100%3Farch=EL