{"url":"http://public2.vulnerablecode.io/api/packages/123868?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-371.8.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-371.8.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86575?format=json","vulnerability_id":"VCID-qd2m-9sbn-c3ep","summary":"Kernel: HID: memory corruption flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2888.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2888","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28162","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1000451","reference_id":"1000451","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1000451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1490","reference_id":"RHSA-2013:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1527","reference_id":"RHSA-2013:1527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1645","reference_id":"RHSA-2013:1645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0433","reference_id":"RHSA-2014:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0433"},{"reference_url":"https://usn.ubuntu.com/1976-1/","reference_id":"USN-1976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1976-1/"},{"reference_url":"https://usn.ubuntu.com/1977-1/","reference_id":"USN-1977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1977-1/"},{"reference_url":"https://usn.ubuntu.com/1995-1/","reference_id":"USN-1995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1995-1/"},{"reference_url":"https://usn.ubuntu.com/1998-1/","reference_id":"USN-1998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1998-1/"},{"reference_url":"https://usn.ubuntu.com/2019-1/","reference_id":"USN-2019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2019-1/"},{"reference_url":"https://usn.ubuntu.com/2021-1/","reference_id":"USN-2021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2021-1/"},{"reference_url":"https://usn.ubuntu.com/2022-1/","reference_id":"USN-2022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2022-1/"},{"reference_url":"https://usn.ubuntu.com/2024-1/","reference_id":"USN-2024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2024-1/"},{"reference_url":"https://usn.ubuntu.com/2038-1/","reference_id":"USN-2038-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2038-1/"},{"reference_url":"https://usn.ubuntu.com/2039-1/","reference_id":"USN-2039-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2039-1/"},{"reference_url":"https://usn.ubuntu.com/2050-1/","reference_id":"USN-2050-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2050-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2888"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qd2m-9sbn-c3ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87202?format=json","vulnerability_id":"VCID-y26v-5xdt-jfhm","summary":"Kernel: net: tcp: potential DoS via SYN+FIN messages","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6638","reference_id":"","reference_type":"","scores":[{"value":"0.011","scoring_system":"epss","scoring_elements":"0.77992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-02T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78029","published_at":"2026-04-04T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78043","published_at":"2026-04-09T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78049","published_at":"2026-04-13T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78077","published_at":"2026-04-21T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.7811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.78117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.011","scoring_system":"epss","scoring_elements":"0.7813","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066055","reference_id":"1066055","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0433","reference_id":"RHSA-2014:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0772","reference_id":"RHSA-2014:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0772"},{"reference_url":"https://usn.ubuntu.com/1514-1/","reference_id":"USN-1514-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1514-1/"},{"reference_url":"https://usn.ubuntu.com/1529-1/","reference_id":"USN-1529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1529-1/"},{"reference_url":"https://usn.ubuntu.com/1651-1/","reference_id":"USN-1651-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1651-1/"},{"reference_url":"https://usn.ubuntu.com/1653-1/","reference_id":"USN-1653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1653-1/"}],"fixed_packages":[],"aliases":["CVE-2012-6638"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y26v-5xdt-jfhm"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-371.8.1%3Farch=el5"}