Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-x51b-yx64-mqbf
Summarysecurity flaw
Aliases
0
alias CVE-2005-3181
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.9-22.0.1?arch=EL
purl pkg:rpm/redhat/kernel@2.6.9-22.0.1?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92t6-tsv4-w3e4
1
vulnerability VCID-b4rg-rvkg-9ka9
2
vulnerability VCID-d54e-864p-qye8
3
vulnerability VCID-epjp-frd1-h3d3
4
vulnerability VCID-rknj-gyet-z7bx
5
vulnerability VCID-x51b-yx64-mqbf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-22.0.1%3Farch=EL
References
0
reference_url http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
reference_id
reference_type
scores
url http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
1
reference_url http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA
reference_id
reference_type
scores
url http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3181.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3181
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35508
published_at 2026-04-29T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.3581
published_at 2026-04-01T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.36
published_at 2026-04-02T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-04T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35861
published_at 2026-04-07T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35911
published_at 2026-04-08T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35934
published_at 2026-04-09T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35941
published_at 2026-04-11T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35901
published_at 2026-04-12T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35876
published_at 2026-04-13T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-16T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35903
published_at 2026-04-18T12:55:00Z
12
value 0.00152
scoring_system epss
scoring_elements 0.35854
published_at 2026-04-21T12:55:00Z
13
value 0.00152
scoring_system epss
scoring_elements 0.35625
published_at 2026-04-24T12:55:00Z
14
value 0.00152
scoring_system epss
scoring_elements 0.35594
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3181
4
reference_url http://secunia.com/advisories/17114
reference_id
reference_type
scores
url http://secunia.com/advisories/17114
5
reference_url http://secunia.com/advisories/17280
reference_id
reference_type
scores
url http://secunia.com/advisories/17280
6
reference_url http://secunia.com/advisories/17364
reference_id
reference_type
scores
url http://secunia.com/advisories/17364
7
reference_url http://secunia.com/advisories/17826
reference_id
reference_type
scores
url http://secunia.com/advisories/17826
8
reference_url http://secunia.com/advisories/17917
reference_id
reference_type
scores
url http://secunia.com/advisories/17917
9
reference_url http://secunia.com/advisories/19374
reference_id
reference_type
scores
url http://secunia.com/advisories/19374
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467
11
reference_url http://www.debian.org/security/2006/dsa-1017
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1017
12
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
13
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
15
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-808.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-808.html
17
reference_url http://www.securityfocus.com/advisories/9549
reference_id
reference_type
scores
url http://www.securityfocus.com/advisories/9549
18
reference_url http://www.securityfocus.com/advisories/9806
reference_id
reference_type
scores
url http://www.securityfocus.com/advisories/9806
19
reference_url http://www.securityfocus.com/archive/1/427980/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427980/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/15076
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15076
21
reference_url http://www.ubuntu.com/usn/usn-199-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-199-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617791
reference_id 1617791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617791
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandriva:linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:10.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:2006.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandriva:linux:2006.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:2006.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3181
reference_id CVE-2005-3181
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3181
31
reference_url https://access.redhat.com/errata/RHSA-2005:808
reference_id RHSA-2005:808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:808
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_score2.1 - 2.1
Exploitability0.5
Weighted_severity1.9
Risk_score0.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-x51b-yx64-mqbf