Lookup for vulnerable packages by Package URL.

GET /api/packages/129251?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/129251?format=api",
    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel-rt",
    "version": "2.6.24.7-74",
    "qualifiers": {
        "arch": "el5rt"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88827?format=api",
            "vulnerability_id": "VCID-2584-pd5b-9bf4",
            "summary": "kernel: [x86_64]  The string instruction version didn't zero the output on exception.",
            "references": [
                {
                    "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19164",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19216",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18932",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1903",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24939",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24988",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24934",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2729"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30849"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30850"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31107"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31551"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31628"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43558"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1630"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29943"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020364"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-625-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-625-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271",
                    "reference_id": "451271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729",
                    "reference_id": "CVE-2008-2729",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0508",
                    "reference_id": "RHSA-2008:0508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0519",
                    "reference_id": "RHSA-2008:0519",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0519"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2729"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2584-pd5b-9bf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88522?format=api",
            "vulnerability_id": "VCID-7f3u-q7tk-h7ac",
            "summary": "IPSec ESP kernel panics",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85127",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85139",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85158",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8518",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85188",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85203",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85197",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85218",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8522",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6282"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=404291",
                    "reference_id": "404291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0237",
                    "reference_id": "RHSA-2008:0237",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0237"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275",
                    "reference_id": "RHSA-2008:0275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0275"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-6282"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3u-q7tk-h7ac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88739?format=api",
            "vulnerability_id": "VCID-czdd-eft9-vyhj",
            "summary": "kernel: infinite loop in highres timers (kernel hang)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13673",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13616",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13668",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13638",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13601",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13553",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13468",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13463",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13534",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6712"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=439999",
                    "reference_id": "439999",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275",
                    "reference_id": "RHSA-2008:0275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0275"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-6712"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czdd-eft9-vyhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88462?format=api",
            "vulnerability_id": "VCID-e1fa-s8q2-3fbv",
            "summary": "kernel: sit memory leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95938",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95946",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95953",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95958",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95967",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95974",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95976",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95986",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95991",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95992",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2136"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=446031",
                    "reference_id": "446031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=446031"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0607",
                    "reference_id": "RHSA-2008:0607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0607"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0612",
                    "reference_id": "RHSA-2008:0612",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0612"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0787",
                    "reference_id": "RHSA-2008:0787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0787"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0973",
                    "reference_id": "RHSA-2008:0973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0001",
                    "reference_id": "RHSA-2009:0001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0001"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2136"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88565?format=api",
            "vulnerability_id": "VCID-g392-veug-qygm",
            "summary": "kernel: non-root can trigger cpu_idle soft lockup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25676",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25558",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25606",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25575",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25518",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25523",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25507",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25476",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5966"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135",
                    "reference_id": "453135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1193",
                    "reference_id": "RHSA-2009:1193",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1193"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079",
                    "reference_id": "RHSA-2010:0079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/574-1/",
                    "reference_id": "USN-574-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/574-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-5966"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g392-veug-qygm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88425?format=api",
            "vulnerability_id": "VCID-k8uq-hwcd-2fg8",
            "summary": "kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow",
            "references": [
                {
                    "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62"
                },
                {
                    "reference_url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"
                },
                {
                    "reference_url": "http://lwn.net/Articles/287350/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lwn.net/Articles/287350/"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35748",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35693",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35891",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35752",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35824",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35832",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35791",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35769",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35808",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35797",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2826"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30901"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31107"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31202"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31551"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31628"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32370"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43559"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2629"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1630"
                },
                {
                    "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29990"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020514",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020514"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-625-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-625-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2511"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=452478",
                    "reference_id": "452478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452478"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2826",
                    "reference_id": "CVE-2008-2826",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2826"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8uq-hwcd-2fg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88530?format=api",
            "vulnerability_id": "VCID-nkbj-56hz-vqfe",
            "summary": "kernel: ptrace: Unprivileged crash on x86_64 %cs corruption",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19276",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19411",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1946",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19178",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19308",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29912",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29892",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1615"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431430",
                    "reference_id": "431430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0237",
                    "reference_id": "RHSA-2008:0237",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0237"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275",
                    "reference_id": "RHSA-2008:0275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0275"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1615"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkbj-56hz-vqfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88495?format=api",
            "vulnerability_id": "VCID-q32m-2g35-uubv",
            "summary": "kernel: fix permission checking in sys_utimensat",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20143",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20291",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20349",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20212",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2019",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20132",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20124",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20129",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20128",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2148"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=455275",
                    "reference_id": "455275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455275"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/625-1/",
                    "reference_id": "USN-625-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/625-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2148"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q32m-2g35-uubv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88426?format=api",
            "vulnerability_id": "VCID-qv5k-g3b6-hfc2",
            "summary": "kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP",
            "references": [
                {
                    "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f"
                },
                {
                    "reference_url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html"
                },
                {
                    "reference_url": "http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14647",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14737",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14788",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14865",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14758",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14819",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14777",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14684",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14578",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14585",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2372"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30901"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31202"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31628"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32393"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32485"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43550"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2629"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-659-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-659-1"
                },
                {
                    "reference_url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666",
                    "reference_id": "452666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372",
                    "reference_id": "CVE-2008-2372",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585",
                    "reference_id": "RHSA-2008:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0957",
                    "reference_id": "RHSA-2008:0957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/659-1/",
                    "reference_id": "USN-659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/659-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2372"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv5k-g3b6-hfc2"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "2.2",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.24.7-74%3Farch=el5rt"
}