Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/123521?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/123521?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.8.13-rt14.25?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "3.8.13-rt14.25", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86537?format=api", "vulnerability_id": "VCID-1ssy-9fat-jbe3", "summary": "kernel: dm: dm-snapshot data leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4299.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74066", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74093", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74065", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74112", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74134", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74116", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.7411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74148", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74147", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74183", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74191", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74184", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74212", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74235", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74221", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00804", "scoring_system": "epss", "scoring_elements": "0.74282", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233", "reference_id": "1004233", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1436", "reference_id": "RHSA-2013:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1449", "reference_id": "RHSA-2013:1449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1450", "reference_id": "RHSA-2013:1450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1519", "reference_id": "RHSA-2013:1519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1520", "reference_id": "RHSA-2013:1520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1520" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1783", "reference_id": "RHSA-2013:1783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1860", "reference_id": "RHSA-2013:1860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1860" }, { "reference_url": "https://usn.ubuntu.com/2015-1/", "reference_id": "USN-2015-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2015-1/" }, { "reference_url": "https://usn.ubuntu.com/2016-1/", "reference_id": "USN-2016-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2016-1/" }, { "reference_url": "https://usn.ubuntu.com/2040-1/", "reference_id": "USN-2040-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2040-1/" }, { "reference_url": "https://usn.ubuntu.com/2041-1/", "reference_id": "USN-2041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2041-1/" }, { "reference_url": "https://usn.ubuntu.com/2042-1/", "reference_id": "USN-2042-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2042-1/" }, { "reference_url": "https://usn.ubuntu.com/2043-1/", "reference_id": "USN-2043-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2043-1/" }, { "reference_url": "https://usn.ubuntu.com/2044-1/", "reference_id": "USN-2044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2044-1/" }, { "reference_url": "https://usn.ubuntu.com/2045-1/", "reference_id": "USN-2045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2045-1/" }, { "reference_url": "https://usn.ubuntu.com/2046-1/", "reference_id": "USN-2046-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2046-1/" }, { "reference_url": "https://usn.ubuntu.com/2049-1/", "reference_id": "USN-2049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2049-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" }, { "reference_url": "https://usn.ubuntu.com/2066-1/", "reference_id": "USN-2066-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2066-1/" }, { "reference_url": "https://usn.ubuntu.com/2067-1/", "reference_id": "USN-2067-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2067-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4299" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ssy-9fat-jbe3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86553?format=api", "vulnerability_id": "VCID-3m6y-3b8p-4ydf", "summary": "kernel: ansi_cprng: off by one error in non-block size request", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4345.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52723", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52681", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52632", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52605", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52548", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.526", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52645", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52609", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52635", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52711", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77527", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77533", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77559", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77539", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77577", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77604", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77588", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77623", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007690", "reference_id": "1007690", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1449", "reference_id": "RHSA-2013:1449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1645", "reference_id": "RHSA-2013:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1645" }, { "reference_url": "https://usn.ubuntu.com/2064-1/", "reference_id": "USN-2064-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2064-1/" }, { "reference_url": "https://usn.ubuntu.com/2065-1/", "reference_id": "USN-2065-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2065-1/" }, { "reference_url": "https://usn.ubuntu.com/2068-1/", "reference_id": "USN-2068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2068-1/" }, { "reference_url": "https://usn.ubuntu.com/2070-1/", "reference_id": "USN-2070-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2070-1/" }, { "reference_url": "https://usn.ubuntu.com/2071-1/", "reference_id": "USN-2071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2071-1/" }, { "reference_url": "https://usn.ubuntu.com/2072-1/", "reference_id": "USN-2072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2072-1/" }, { "reference_url": "https://usn.ubuntu.com/2074-1/", "reference_id": "USN-2074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2074-1/" }, { "reference_url": "https://usn.ubuntu.com/2075-1/", "reference_id": "USN-2075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2075-1/" }, { "reference_url": "https://usn.ubuntu.com/2076-1/", "reference_id": "USN-2076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2076-1/" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2158-1/", "reference_id": "USN-2158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2158-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4345" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m6y-3b8p-4ydf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86555?format=api", "vulnerability_id": "VCID-eauu-z23h-puas", "summary": "Kernel: net: use-after-free TUNSETIFF", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4343.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25694", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25649", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25665", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25607", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25564", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25517", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25509", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25461", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25348", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25416", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25477", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25397", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25415", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25494", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25525", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4343" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007733", "reference_id": "1007733", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/2020-1/", "reference_id": "USN-2020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2020-1/" }, { "reference_url": "https://usn.ubuntu.com/2023-1/", "reference_id": "USN-2023-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2023-1/" }, { "reference_url": "https://usn.ubuntu.com/2049-1/", "reference_id": "USN-2049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2049-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4343" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eauu-z23h-puas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86574?format=api", "vulnerability_id": "VCID-hrk4-wrw3-zbdm", "summary": "Kernel: HID: pantherlord: heap overflow flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2892.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2892.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2892", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25207", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24978", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25046", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25106", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2502", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25012", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24921", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24909", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24864", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24743", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24817", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24879", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24804", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24825", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24902", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24936", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2892" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000429", "reference_id": "1000429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1527", "reference_id": "RHSA-2013:1527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1645", "reference_id": "RHSA-2013:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1645" }, { "reference_url": "https://usn.ubuntu.com/1976-1/", "reference_id": "USN-1976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1976-1/" }, { "reference_url": "https://usn.ubuntu.com/1977-1/", "reference_id": "USN-1977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1977-1/" }, { "reference_url": "https://usn.ubuntu.com/1995-1/", "reference_id": "USN-1995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1995-1/" }, { "reference_url": "https://usn.ubuntu.com/1998-1/", "reference_id": "USN-1998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1998-1/" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2892" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrk4-wrw3-zbdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86918?format=api", "vulnerability_id": "VCID-k8bc-n5f9-57a1", "summary": "kernel: handling of IPv6 temporary addresses", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2012/12/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2012/12/05/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2013/01/16/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2013/01/16/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2013/01/21/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2013/01/21/11" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1449.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1490.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1645.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0343.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66823", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66586", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66622", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66695", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66669", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66713", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66755", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66728", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66748", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66812", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/22/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/22/6" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1976-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1976-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1977-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1977-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2019-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2019-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2020-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2020-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2021-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2021-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2022-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2022-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2023-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2023-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2024-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2024-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2038-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2038-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2039-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2039-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2050-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2050-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=914664", "reference_id": "914664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=914664" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0343", "reference_id": "CVE-2013-0343", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:P/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1449", "reference_id": "RHSA-2013:1449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1645", "reference_id": "RHSA-2013:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1645" }, { "reference_url": "https://usn.ubuntu.com/1976-1/", "reference_id": "USN-1976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1976-1/" }, { "reference_url": "https://usn.ubuntu.com/1977-1/", "reference_id": "USN-1977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1977-1/" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2020-1/", "reference_id": "USN-2020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2020-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2023-1/", "reference_id": "USN-2023-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2023-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0343" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8bc-n5f9-57a1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86577?format=api", "vulnerability_id": "VCID-mkz8-fsd7-bfcx", "summary": "Kernel: HID: ntrig: NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2896.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25238", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25269", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25298", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25305", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25229", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25218", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25173", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25054", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25119", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25179", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25107", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25126", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25203", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2896" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000494", "reference_id": "1000494", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/1995-1/", "reference_id": "USN-1995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1995-1/" }, { "reference_url": "https://usn.ubuntu.com/1998-1/", "reference_id": "USN-1998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1998-1/" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2896" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mkz8-fsd7-bfcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86550?format=api", "vulnerability_id": "VCID-p5v7-c1x2-u3gj", "summary": "Kernel: net: IPv6: panic when UFO=On for an interface", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4387.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.69958", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.69971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.69985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.69962", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70009", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70026", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70049", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70073", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70054", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70105", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70113", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70112", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70089", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.7013", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70161", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70157", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70206", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0062", "scoring_system": "epss", "scoring_elements": "0.70217", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1011927", "reference_id": "1011927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1011927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1645", "reference_id": "RHSA-2013:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0284", "reference_id": "RHSA-2014:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0284" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2041-1/", "reference_id": "USN-2041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2041-1/" }, { "reference_url": "https://usn.ubuntu.com/2045-1/", "reference_id": "USN-2045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2045-1/" }, { "reference_url": "https://usn.ubuntu.com/2049-1/", "reference_id": "USN-2049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2049-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" }, { "reference_url": "https://usn.ubuntu.com/2233-1/", "reference_id": "USN-2233-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2233-1/" }, { "reference_url": "https://usn.ubuntu.com/2234-1/", "reference_id": "USN-2234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2234-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4387" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p5v7-c1x2-u3gj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86575?format=api", "vulnerability_id": "VCID-qd2m-9sbn-c3ep", "summary": "Kernel: HID: memory corruption flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2888.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2888.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2888", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.2826", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.2833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28162", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28276", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28174", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28187", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.2817", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28125", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28041", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27929", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27852", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27681", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27744", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27765", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27684", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.277", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27777", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27796", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2888" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000451", "reference_id": "1000451", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1527", "reference_id": "RHSA-2013:1527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1645", "reference_id": "RHSA-2013:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0433", "reference_id": "RHSA-2014:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0433" }, { "reference_url": "https://usn.ubuntu.com/1976-1/", "reference_id": "USN-1976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1976-1/" }, { "reference_url": "https://usn.ubuntu.com/1977-1/", "reference_id": "USN-1977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1977-1/" }, { "reference_url": "https://usn.ubuntu.com/1995-1/", "reference_id": "USN-1995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1995-1/" }, { "reference_url": "https://usn.ubuntu.com/1998-1/", "reference_id": "USN-1998-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1998-1/" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2888" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qd2m-9sbn-c3ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86571?format=api", "vulnerability_id": "VCID-rsv8-qgud-tbgu", "summary": "Kernel: HID: logitech-dj: heap overflow flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2895.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2895.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2895", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25269", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25298", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25305", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25229", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25218", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25173", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25054", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25119", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25179", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25107", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25126", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25203", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25238", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2895" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000360", "reference_id": "1000360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2020-1/", "reference_id": "USN-2020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2020-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2023-1/", "reference_id": "USN-2023-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2023-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2895" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rsv8-qgud-tbgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86573?format=api", "vulnerability_id": "VCID-wd2c-1h59-kqg8", "summary": "Kernel: HID: LG: heap overflow flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2893.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2893.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2893", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25207", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24978", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25046", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25106", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2502", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25012", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24921", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24909", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24864", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24743", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24817", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24879", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24804", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24825", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24902", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24936", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2893" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000414", "reference_id": "1000414", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/2015-1/", "reference_id": "USN-2015-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2015-1/" }, { "reference_url": "https://usn.ubuntu.com/2016-1/", "reference_id": "USN-2016-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2016-1/" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2020-1/", "reference_id": "USN-2020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2020-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2023-1/", "reference_id": "USN-2023-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2023-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2893" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wd2c-1h59-kqg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86520?format=api", "vulnerability_id": "VCID-y51g-zav1-gbes", "summary": "kernel: net: deadloop path in skb_flow_dissect()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4348.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4348.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4348", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89641", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.8966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89698", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89692", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89707", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89709", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89719", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89745", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89741", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.8975", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89769", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0497", "scoring_system": "epss", "scoring_elements": "0.89779", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4348" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007939", "reference_id": "1007939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/2068-1/", "reference_id": "USN-2068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2068-1/" }, { "reference_url": "https://usn.ubuntu.com/2070-1/", "reference_id": "USN-2070-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2070-1/" }, { "reference_url": "https://usn.ubuntu.com/2075-1/", "reference_id": "USN-2075-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2075-1/" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2112-1/", "reference_id": "USN-2112-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2112-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4348" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y51g-zav1-gbes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87564?format=api", "vulnerability_id": "VCID-yqbg-98yt-n7a8", "summary": "kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4350.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51329", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51377", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51404", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51362", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51457", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51465", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51473", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.5141", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.5137", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51314", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51364", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51407", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51368", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51396", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51476", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51487", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007872", "reference_id": "1007872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1490", "reference_id": "RHSA-2013:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1490" }, { "reference_url": "https://usn.ubuntu.com/2019-1/", "reference_id": "USN-2019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2019-1/" }, { "reference_url": "https://usn.ubuntu.com/2021-1/", "reference_id": "USN-2021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2021-1/" }, { "reference_url": "https://usn.ubuntu.com/2022-1/", "reference_id": "USN-2022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2022-1/" }, { "reference_url": "https://usn.ubuntu.com/2024-1/", "reference_id": "USN-2024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2024-1/" }, { "reference_url": "https://usn.ubuntu.com/2038-1/", "reference_id": "USN-2038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2038-1/" }, { "reference_url": "https://usn.ubuntu.com/2039-1/", "reference_id": "USN-2039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2039-1/" }, { "reference_url": "https://usn.ubuntu.com/2041-1/", "reference_id": "USN-2041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2041-1/" }, { "reference_url": "https://usn.ubuntu.com/2045-1/", "reference_id": "USN-2045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2045-1/" }, { "reference_url": "https://usn.ubuntu.com/2049-1/", "reference_id": "USN-2049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2049-1/" }, { "reference_url": "https://usn.ubuntu.com/2050-1/", "reference_id": "USN-2050-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2050-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4350" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqbg-98yt-n7a8" } ], "fixing_vulnerabilities": [], "risk_score": "1.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.8.13-rt14.25%3Farch=el6rt" }