Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/124617?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/124617?format=api", "purl": "pkg:rpm/redhat/kvm@83-262.el5_9?arch=3", "type": "rpm", "namespace": "redhat", "name": "kvm", "version": "83-262.el5_9", "qualifiers": { "arch": "3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86727?format=api", "vulnerability_id": "VCID-1bd5-whez-47au", "summary": "kernel: kvm: out-of-bounds access in ioapic indirect register reads", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" }, { "reference_url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1798.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1798.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1798", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56872", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.5689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56868", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56809", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56764", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.5681", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1798" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798" }, { "reference_url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/03/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/03/20/9" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1809-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1809-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1812-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1812-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1813-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1813-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017", "reference_id": "917017", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917017" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1798", "reference_id": "CVE-2013-1798", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1798" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0727", "reference_id": "RHSA-2013:0727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0744", "reference_id": "RHSA-2013:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0746", "reference_id": "RHSA-2013:0746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0928", "reference_id": "RHSA-2013:0928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1026", "reference_id": "RHSA-2013:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1026" }, { "reference_url": "https://usn.ubuntu.com/1809-1/", "reference_id": "USN-1809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1809-1/" }, { "reference_url": "https://usn.ubuntu.com/1812-1/", "reference_id": "USN-1812-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1812-1/" }, { "reference_url": "https://usn.ubuntu.com/1813-1/", "reference_id": "USN-1813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1813-1/" }, { "reference_url": "https://usn.ubuntu.com/1876-1/", "reference_id": "USN-1876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1876-1/" }, { "reference_url": "https://usn.ubuntu.com/1877-1/", "reference_id": "USN-1877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1798" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bd5-whez-47au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86726?format=api", "vulnerability_id": "VCID-hsy3-wjb5-zkbh", "summary": "kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70209", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70008", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70021", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70011", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70075", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70084", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70123", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70103", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70154", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70137", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70179", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" }, { "reference_url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/03/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/03/20/9" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1809-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1809-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1812-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1812-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1813-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1813-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013", "reference_id": "917013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917013" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1797", "reference_id": "CVE-2013-1797", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1797" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0727", "reference_id": "RHSA-2013:0727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0744", "reference_id": "RHSA-2013:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0746", "reference_id": "RHSA-2013:0746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0928", "reference_id": "RHSA-2013:0928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1026", "reference_id": "RHSA-2013:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1026" }, { "reference_url": "https://usn.ubuntu.com/1809-1/", "reference_id": "USN-1809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1809-1/" }, { "reference_url": "https://usn.ubuntu.com/1811-1/", "reference_id": "USN-1811-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1811-1/" }, { "reference_url": "https://usn.ubuntu.com/1812-1/", "reference_id": "USN-1812-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1812-1/" }, { "reference_url": "https://usn.ubuntu.com/1813-1/", "reference_id": "USN-1813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1813-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1797" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsy3-wjb5-zkbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54426?format=api", "vulnerability_id": "VCID-zdju-kbv8-mfbr", "summary": "several", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c300aa64ddf57d9c5d9c898a64b36877345dd4a9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c300aa64ddf57d9c5d9c898a64b36877345dd4a9" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0727.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0744.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0928.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1026.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1796.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1796.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1796", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77858", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77702", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77712", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77747", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77772", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77798", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.77809", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01068", "scoring_system": "epss", "scoring_elements": "0.7784", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1796" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301" }, { "reference_url": "https://github.com/torvalds/linux/commit/c300aa64ddf57d9c5d9c898a64b36877345dd4a9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/c300aa64ddf57d9c5d9c898a64b36877345dd4a9" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/03/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/03/20/9" }, { "reference_url": "http://www.securityfocus.com/bid/58607", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58607" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1805-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1805-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1808-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1808-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1809-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1809-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1812-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1812-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1813-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1813-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917012", "reference_id": "917012", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917012" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1796", "reference_id": "CVE-2013-1796", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1796" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0727", "reference_id": "RHSA-2013:0727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0744", "reference_id": "RHSA-2013:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0746", "reference_id": "RHSA-2013:0746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0928", "reference_id": "RHSA-2013:0928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1026", "reference_id": "RHSA-2013:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1026" }, { "reference_url": "https://usn.ubuntu.com/1805-1/", "reference_id": "USN-1805-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1805-1/" }, { "reference_url": "https://usn.ubuntu.com/1808-1/", "reference_id": "USN-1808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1808-1/" }, { "reference_url": "https://usn.ubuntu.com/1809-1/", "reference_id": "USN-1809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1809-1/" }, { "reference_url": "https://usn.ubuntu.com/1812-1/", "reference_id": "USN-1812-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1812-1/" }, { "reference_url": "https://usn.ubuntu.com/1813-1/", "reference_id": "USN-1813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1813-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1796" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdju-kbv8-mfbr" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kvm@83-262.el5_9%3Farch=3" }