Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-uhct-x5jv-3uch
Summarysecurity flaw
Aliases
0
alias CVE-2005-0736
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.4.21-27.0.4?arch=EL
purl pkg:rpm/redhat/kernel@2.4.21-27.0.4?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-195a-sep6-skgs
1
vulnerability VCID-5ppc-y5kq-cffr
2
vulnerability VCID-7r8j-9yny-abga
3
vulnerability VCID-8w9q-jxwm-h3g6
4
vulnerability VCID-bu4c-5akz-guh1
5
vulnerability VCID-epyd-17rg-dkc9
6
vulnerability VCID-g2nn-njhq-c3ab
7
vulnerability VCID-mxa4-rpev-nkhw
8
vulnerability VCID-s5re-bgx3-xke4
9
vulnerability VCID-t6c6-1mb6-7ude
10
vulnerability VCID-uhct-x5jv-3uch
11
vulnerability VCID-vy5g-tuxf-57gq
12
vulnerability VCID-xabj-ueyv-hfdv
13
vulnerability VCID-xx3w-5nxf-bffb
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-27.0.4%3Farch=EL
1
url pkg:rpm/redhat/kernel@2.6.9-5.0.5?arch=EL
purl pkg:rpm/redhat/kernel@2.6.9-5.0.5?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16ss-nfwj-nqgf
1
vulnerability VCID-195a-sep6-skgs
2
vulnerability VCID-5p17-f8g3-nqht
3
vulnerability VCID-7r8j-9yny-abga
4
vulnerability VCID-8bv2-bt2j-5ub1
5
vulnerability VCID-8w9q-jxwm-h3g6
6
vulnerability VCID-akd5-n2mz-tqdz
7
vulnerability VCID-e6gu-ty53-w7gu
8
vulnerability VCID-epyd-17rg-dkc9
9
vulnerability VCID-g2nn-njhq-c3ab
10
vulnerability VCID-he94-wgvj-jbgj
11
vulnerability VCID-jghv-5719-5fb2
12
vulnerability VCID-m1xa-nmbf-uqen
13
vulnerability VCID-q4rc-k71h-2qay
14
vulnerability VCID-r97v-uhd8-h3hq
15
vulnerability VCID-suxb-gmb8-r7ft
16
vulnerability VCID-uhct-x5jv-3uch
17
vulnerability VCID-zxb5-nkbs-cqc7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-5.0.5%3Farch=EL
References
0
reference_url http://linux.bkbits.net:8080/linux-2.6/cset%40422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html%7CChangeSet%40-1d
reference_id
reference_type
scores
url http://linux.bkbits.net:8080/linux-2.6/cset%40422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html%7CChangeSet%40-1d
1
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0736.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0736
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15248
published_at 2026-04-26T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15325
published_at 2026-04-01T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15362
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15433
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15236
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15324
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15374
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-11T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15297
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15145
published_at 2026-04-16T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15153
published_at 2026-04-18T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.1521
published_at 2026-04-21T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.1525
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0736
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870
5
reference_url http://www.novell.com/linux/security/advisories/2005_18_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_18_kernel.html
6
reference_url http://www.redhat.com/support/errata/RHSA-2005-293.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-293.html
7
reference_url http://www.redhat.com/support/errata/RHSA-2005-366.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-366.html
8
reference_url http://www.securityfocus.com/bid/12763
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12763
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617564
reference_id 1617564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617564
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0736
reference_id CVE-2005-0736
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-0736
30
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1397.c
reference_id CVE-2005-0736;OSVDB-14777
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1397.c
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25202.c
reference_id CVE-2005-0736;OSVDB-14777
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25202.c
32
reference_url https://www.securityfocus.com/bid/12763/info
reference_id CVE-2005-0736;OSVDB-14777
reference_type exploit
scores
url https://www.securityfocus.com/bid/12763/info
33
reference_url https://access.redhat.com/errata/RHSA-2005:293
reference_id RHSA-2005:293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:293
34
reference_url https://access.redhat.com/errata/RHSA-2005:366
reference_id RHSA-2005:366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:366
35
reference_url https://usn.ubuntu.com/95-1/
reference_id USN-95-1
reference_type
scores
url https://usn.ubuntu.com/95-1/
Weaknesses
Exploits
0
date_added 2005-03-09
description Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2005-03-09
exploit_type local
platform linux
source_date_updated 2019-03-07
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/12763/info
Severity_range_score2.1 - 2.1
Exploitability2.0
Weighted_severity1.9
Risk_score3.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-uhct-x5jv-3uch