{"url":"http://public2.vulnerablecode.io/api/packages/123431?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-371.6.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-371.6.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3958?format=json","vulnerability_id":"VCID-53ty-fwby-nuca","summary":"Guest triggerable AMD CPU erratum may cause host hang","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6885","reference_id":"","reference_type":"","scores":[{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.7229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.7236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72412","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72421","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72409","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1035823","reference_id":"1035823","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1035823"},{"reference_url":"https://security.gentoo.org/glsa/201407-03","reference_id":"GLSA-201407-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201407-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-82.html","reference_id":"XSA-82","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-82.html"}],"fixed_packages":[],"aliases":["CVE-2013-6885"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-53ty-fwby-nuca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86490?format=json","vulnerability_id":"VCID-9ny6-5hnd-9fa1","summary":"Kernel: net: leakage of uninitialized memory to user-space via recv syscalls","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7263.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7263","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14273","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14226","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14103","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14178","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13993","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1035875","reference_id":"1035875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1035875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0159","reference_id":"RHSA-2014:0159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0439","reference_id":"RHSA-2014:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0439"},{"reference_url":"https://usn.ubuntu.com/2107-1/","reference_id":"USN-2107-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2107-1/"},{"reference_url":"https://usn.ubuntu.com/2108-1/","reference_id":"USN-2108-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2108-1/"},{"reference_url":"https://usn.ubuntu.com/2109-1/","reference_id":"USN-2109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2109-1/"},{"reference_url":"https://usn.ubuntu.com/2110-1/","reference_id":"USN-2110-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2110-1/"},{"reference_url":"https://usn.ubuntu.com/2113-1/","reference_id":"USN-2113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2113-1/"},{"reference_url":"https://usn.ubuntu.com/2117-1/","reference_id":"USN-2117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2117-1/"},{"reference_url":"https://usn.ubuntu.com/2135-1/","reference_id":"USN-2135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2135-1/"},{"reference_url":"https://usn.ubuntu.com/2136-1/","reference_id":"USN-2136-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2136-1/"},{"reference_url":"https://usn.ubuntu.com/2138-1/","reference_id":"USN-2138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2138-1/"},{"reference_url":"https://usn.ubuntu.com/2139-1/","reference_id":"USN-2139-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2139-1/"},{"reference_url":"https://usn.ubuntu.com/2141-1/","reference_id":"USN-2141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2141-1/"}],"fixed_packages":[],"aliases":["CVE-2013-7263"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ny6-5hnd-9fa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86507?format=json","vulnerability_id":"VCID-ffr9-vctt-x3gw","summary":"kernel: exec/ptrace: get_dumpable() incorrect tests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2929.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2929","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01304","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01337","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01312","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01635","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0164","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01641","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1028148","reference_id":"1028148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1028148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0100","reference_id":"RHSA-2014:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0159","reference_id":"RHSA-2014:0159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1971","reference_id":"RHSA-2014:1971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1252","reference_id":"RHSA-2018:1252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1252"},{"reference_url":"https://usn.ubuntu.com/2070-1/","reference_id":"USN-2070-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2070-1/"},{"reference_url":"https://usn.ubuntu.com/2075-1/","reference_id":"USN-2075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2075-1/"},{"reference_url":"https://usn.ubuntu.com/2109-1/","reference_id":"USN-2109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2109-1/"},{"reference_url":"https://usn.ubuntu.com/2110-1/","reference_id":"USN-2110-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2110-1/"},{"reference_url":"https://usn.ubuntu.com/2111-1/","reference_id":"USN-2111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2111-1/"},{"reference_url":"https://usn.ubuntu.com/2112-1/","reference_id":"USN-2112-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2112-1/"},{"reference_url":"https://usn.ubuntu.com/2114-1/","reference_id":"USN-2114-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2114-1/"},{"reference_url":"https://usn.ubuntu.com/2115-1/","reference_id":"USN-2115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2115-1/"},{"reference_url":"https://usn.ubuntu.com/2116-1/","reference_id":"USN-2116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2116-1/"},{"reference_url":"https://usn.ubuntu.com/2128-1/","reference_id":"USN-2128-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2128-1/"},{"reference_url":"https://usn.ubuntu.com/2129-1/","reference_id":"USN-2129-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2129-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2929"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffr9-vctt-x3gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3955?format=json","vulnerability_id":"VCID-mr8s-g8d8-euhb","summary":"Hypercalls exposed to privilege rings 1 and 2 of HVM guests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4554","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43266","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43287","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43272","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43323","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.42983","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4554"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1029111","reference_id":"1029111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1029111"},{"reference_url":"https://security.gentoo.org/glsa/201407-03","reference_id":"GLSA-201407-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201407-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-76.html","reference_id":"XSA-76","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-76.html"}],"fixed_packages":[],"aliases":["CVE-2013-4554"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mr8s-g8d8-euhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86469?format=json","vulnerability_id":"VCID-v4dp-8rd5-gufz","summary":"Kernel: AACRAID Driver compat IOCTL missing capability check","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6383","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0562","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05667","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1033530","reference_id":"1033530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1033530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0100","reference_id":"RHSA-2014:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0475","reference_id":"RHSA-2014:0475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0476","reference_id":"RHSA-2014:0476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0634","reference_id":"RHSA-2014:0634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0634"},{"reference_url":"https://usn.ubuntu.com/2066-1/","reference_id":"USN-2066-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2066-1/"},{"reference_url":"https://usn.ubuntu.com/2067-1/","reference_id":"USN-2067-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2067-1/"},{"reference_url":"https://usn.ubuntu.com/2068-1/","reference_id":"USN-2068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2068-1/"},{"reference_url":"https://usn.ubuntu.com/2069-1/","reference_id":"USN-2069-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2069-1/"},{"reference_url":"https://usn.ubuntu.com/2070-1/","reference_id":"USN-2070-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2070-1/"},{"reference_url":"https://usn.ubuntu.com/2071-1/","reference_id":"USN-2071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2071-1/"},{"reference_url":"https://usn.ubuntu.com/2072-1/","reference_id":"USN-2072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2072-1/"},{"reference_url":"https://usn.ubuntu.com/2073-1/","reference_id":"USN-2073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2073-1/"},{"reference_url":"https://usn.ubuntu.com/2074-1/","reference_id":"USN-2074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2074-1/"},{"reference_url":"https://usn.ubuntu.com/2075-1/","reference_id":"USN-2075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2075-1/"},{"reference_url":"https://usn.ubuntu.com/2076-1/","reference_id":"USN-2076-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2076-1/"},{"reference_url":"https://usn.ubuntu.com/2107-1/","reference_id":"USN-2107-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2107-1/"},{"reference_url":"https://usn.ubuntu.com/2108-1/","reference_id":"USN-2108-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2108-1/"}],"fixed_packages":[],"aliases":["CVE-2013-6383"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4dp-8rd5-gufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86522?format=json","vulnerability_id":"VCID-vevd-uruj-fqad","summary":"kernel: ipc: ipc_rcu_putref refcount races","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4483","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25768","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25753","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25501","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024854","reference_id":"1024854","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0439","reference_id":"RHSA-2014:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1392","reference_id":"RHSA-2014:1392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0284","reference_id":"RHSA-2015:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0284"},{"reference_url":"https://usn.ubuntu.com/2221-1/","reference_id":"USN-2221-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2221-1/"},{"reference_url":"https://usn.ubuntu.com/2223-1/","reference_id":"USN-2223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2223-1/"},{"reference_url":"https://usn.ubuntu.com/2227-1/","reference_id":"USN-2227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2227-1/"},{"reference_url":"https://usn.ubuntu.com/2233-1/","reference_id":"USN-2233-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2233-1/"},{"reference_url":"https://usn.ubuntu.com/2234-1/","reference_id":"USN-2234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2234-1/"},{"reference_url":"https://usn.ubuntu.com/2238-1/","reference_id":"USN-2238-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2238-1/"}],"fixed_packages":[],"aliases":["CVE-2013-4483"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vevd-uruj-fqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86473?format=json","vulnerability_id":"VCID-xrqy-1hju-ykcv","summary":"Kernel: qeth: buffer overflow in snmp ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6381.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6381","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26288","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25901","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1033600","reference_id":"1033600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1033600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0159","reference_id":"RHSA-2014:0159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0284","reference_id":"RHSA-2014:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0285","reference_id":"RHSA-2014:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0476","reference_id":"RHSA-2014:0476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0476"}],"fixed_packages":[],"aliases":["CVE-2013-6381"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xrqy-1hju-ykcv"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-371.6.1%3Farch=el5"}