Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-dx7m-ma2j-6ket
Summarykernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
Aliases
0
alias CVE-2011-1745
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rgx-tmw4-uqgt
1
vulnerability VCID-4gcp-bfru-57ay
2
vulnerability VCID-8nyx-mdyc-t3ez
3
vulnerability VCID-a9mu-gdgc-cbct
4
vulnerability VCID-au4y-xz41-zyfy
5
vulnerability VCID-dd7k-u8ev-abhz
6
vulnerability VCID-dx7m-ma2j-6ket
7
vulnerability VCID-fhyj-cymx-pfgp
8
vulnerability VCID-j67y-7adf-3ygp
9
vulnerability VCID-ku5j-hkct-aug2
10
vulnerability VCID-nktq-p6vq-hkgq
11
vulnerability VCID-wg43-zbfb-nfaq
12
vulnerability VCID-ydtx-ae9c-eqah
13
vulnerability VCID-yevh-cfer-dud1
14
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5
1
url pkg:rpm/redhat/kernel@2.6.32-131.17.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-131.17.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4gcp-bfru-57ay
1
vulnerability VCID-5qm7-9fkz-j7fb
2
vulnerability VCID-8uu6-qhdz-qqff
3
vulnerability VCID-dk3j-jd9m-w3ap
4
vulnerability VCID-dx7m-ma2j-6ket
5
vulnerability VCID-fhyj-cymx-pfgp
6
vulnerability VCID-fqyj-zxer-p3cf
7
vulnerability VCID-hs39-gt1g-8kc3
8
vulnerability VCID-rcsx-nhxh-4fcy
9
vulnerability VCID-uvtu-2xmq-jfbw
10
vulnerability VCID-yr1x-jyca-tbb7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.17.1%3Farch=el6
2
url pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kqc-mk8b-qyew
1
vulnerability VCID-1n7j-hq91-qqgy
2
vulnerability VCID-37uh-rp8n-sfa2
3
vulnerability VCID-4gcp-bfru-57ay
4
vulnerability VCID-4uay-c8mx-ekdb
5
vulnerability VCID-58bv-cjnr-3fdh
6
vulnerability VCID-5mpc-pasz-x3hd
7
vulnerability VCID-7m3j-x9kb-9ffv
8
vulnerability VCID-91gu-1pgh-jubb
9
vulnerability VCID-9n2b-z8vv-qbec
10
vulnerability VCID-a9mu-gdgc-cbct
11
vulnerability VCID-au4y-xz41-zyfy
12
vulnerability VCID-axbc-ddng-buap
13
vulnerability VCID-c551-3re3-xfat
14
vulnerability VCID-dk3j-jd9m-w3ap
15
vulnerability VCID-dx7m-ma2j-6ket
16
vulnerability VCID-dxqf-acq4-nuca
17
vulnerability VCID-fd7y-6dw5-x7h4
18
vulnerability VCID-fhyj-cymx-pfgp
19
vulnerability VCID-fj3a-gsa8-nug7
20
vulnerability VCID-fqyj-zxer-p3cf
21
vulnerability VCID-h9a4-7v2b-9kg2
22
vulnerability VCID-j67y-7adf-3ygp
23
vulnerability VCID-krvj-487p-auep
24
vulnerability VCID-nktq-p6vq-hkgq
25
vulnerability VCID-peud-25dw-4ud9
26
vulnerability VCID-s48v-g94e-jkb9
27
vulnerability VCID-sn81-psqc-r7de
28
vulnerability VCID-st8n-ewcq-tqd8
29
vulnerability VCID-t54j-wpun-nfcb
30
vulnerability VCID-u5y7-amh6-3uec
31
vulnerability VCID-uvtu-2xmq-jfbw
32
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75%3Farch=el6rt
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
1
reference_url http://openwall.com/lists/oss-security/2011/04/21/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/21/4
2
reference_url http://openwall.com/lists/oss-security/2011/04/22/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/22/7
3
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13119
published_at 2026-04-26T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13156
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13266
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13331
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13128
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1323
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13193
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13141
published_at 2026-04-21T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13046
published_at 2026-04-18T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1745
6
reference_url https://lkml.org/lkml/2011/4/14/293
reference_id
reference_type
scores
url https://lkml.org/lkml/2011/4/14/293
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
8
reference_url http://www.securityfocus.com/bid/47534
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47534
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=698996
reference_id 698996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=698996
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
reference_id CVE-2011-1745
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1745
18
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
19
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
20
reference_url https://access.redhat.com/errata/RHSA-2011:1350
reference_id RHSA-2011:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1350
21
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1161-1/
reference_id USN-1161-1
reference_type
scores
url https://usn.ubuntu.com/1161-1/
24
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
25
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
26
reference_url https://usn.ubuntu.com/1167-1/
reference_id USN-1167-1
reference_type
scores
url https://usn.ubuntu.com/1167-1/
27
reference_url https://usn.ubuntu.com/1168-1/
reference_id USN-1168-1
reference_type
scores
url https://usn.ubuntu.com/1168-1/
28
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
31
reference_url https://usn.ubuntu.com/1212-1/
reference_id USN-1212-1
reference_type
scores
url https://usn.ubuntu.com/1212-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score6.9 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-dx7m-ma2j-6ket