{"url":"http://public2.vulnerablecode.io/api/packages/125887?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-279.9.1?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-279.9.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87078?format=json","vulnerability_id":"VCID-1mhp-87fh-mkc1","summary":"kernel: huge pages: memory leak on mmap failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2390","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12718","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12789","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12581","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17689","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17797","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22521","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=824345","reference_id":"824345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=824345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1150","reference_id":"RHSA-2012:1150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1304","reference_id":"RHSA-2012:1304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1304"},{"reference_url":"https://usn.ubuntu.com/1508-1/","reference_id":"USN-1508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1508-1/"},{"reference_url":"https://usn.ubuntu.com/1515-1/","reference_id":"USN-1515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1515-1/"},{"reference_url":"https://usn.ubuntu.com/1531-1/","reference_id":"USN-1531-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1531-1/"},{"reference_url":"https://usn.ubuntu.com/1533-1/","reference_id":"USN-1533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1533-1/"},{"reference_url":"https://usn.ubuntu.com/1534-1/","reference_id":"USN-1534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1534-1/"},{"reference_url":"https://usn.ubuntu.com/1535-1/","reference_id":"USN-1535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1535-1/"},{"reference_url":"https://usn.ubuntu.com/1538-1/","reference_id":"USN-1538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1538-1/"},{"reference_url":"https://usn.ubuntu.com/1539-1/","reference_id":"USN-1539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1539-1/"}],"fixed_packages":[],"aliases":["CVE-2012-2390"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mhp-87fh-mkc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87091?format=json","vulnerability_id":"VCID-3b63-awen-vfeb","summary":"kernel: unfiltered netdev rio_ioctl access by users","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2313.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2313","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38275","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38285","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42214","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42169","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42115","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42033","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42256","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=818820","reference_id":"818820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=818820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1174","reference_id":"RHSA-2012:1174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1282","reference_id":"RHSA-2012:1282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1304","reference_id":"RHSA-2012:1304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1481","reference_id":"RHSA-2012:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1541","reference_id":"RHSA-2012:1541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1589","reference_id":"RHSA-2012:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1589"},{"reference_url":"https://usn.ubuntu.com/1471-1/","reference_id":"USN-1471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1471-1/"},{"reference_url":"https://usn.ubuntu.com/1472-1/","reference_id":"USN-1472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1472-1/"},{"reference_url":"https://usn.ubuntu.com/1473-1/","reference_id":"USN-1473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1473-1/"},{"reference_url":"https://usn.ubuntu.com/1474-1/","reference_id":"USN-1474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1474-1/"},{"reference_url":"https://usn.ubuntu.com/1476-1/","reference_id":"USN-1476-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1476-1/"},{"reference_url":"https://usn.ubuntu.com/1488-1/","reference_id":"USN-1488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1488-1/"},{"reference_url":"https://usn.ubuntu.com/1490-1/","reference_id":"USN-1490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1490-1/"},{"reference_url":"https://usn.ubuntu.com/1491-1/","reference_id":"USN-1491-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1491-1/"},{"reference_url":"https://usn.ubuntu.com/1492-1/","reference_id":"USN-1492-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1492-1/"},{"reference_url":"https://usn.ubuntu.com/1493-1/","reference_id":"USN-1493-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1493-1/"},{"reference_url":"https://usn.ubuntu.com/1530-1/","reference_id":"USN-1530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1530-1/"}],"fixed_packages":[],"aliases":["CVE-2012-2313"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3b63-awen-vfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87035?format=json","vulnerability_id":"VCID-49m9-z9q9-13bm","summary":"kernel: recv{from,msg}() on an rds socket can leak kernel memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1323.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1323.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3430.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3430","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38897","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38881","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430"},{"reference_url":"http://secunia.com/advisories/50633","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50633"},{"reference_url":"http://secunia.com/advisories/50732","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50732"},{"reference_url":"http://secunia.com/advisories/50811","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50811"},{"reference_url":"https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7"},{"reference_url":"https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/26/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/26/5"},{"reference_url":"http://www.ubuntu.com/usn/USN-1567-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1567-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1568-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1568-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1572-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1572-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1575-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1575-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1577-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1577-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1578-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1578-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1579-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1579-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1580-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1580-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=820039","reference_id":"820039","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=820039"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3430","reference_id":"CVE-2012-3430","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3430"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37543.c","reference_id":"CVE-2012-3430;OSVDB-85606","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37543.c"},{"reference_url":"https://www.securityfocus.com/bid/54702/info","reference_id":"CVE-2012-3430;OSVDB-85606","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54702/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1304","reference_id":"RHSA-2012:1304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1323","reference_id":"RHSA-2012:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1491","reference_id":"RHSA-2012:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1491"},{"reference_url":"https://usn.ubuntu.com/1567-1/","reference_id":"USN-1567-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1567-1/"},{"reference_url":"https://usn.ubuntu.com/1568-1/","reference_id":"USN-1568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1568-1/"},{"reference_url":"https://usn.ubuntu.com/1572-1/","reference_id":"USN-1572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1572-1/"},{"reference_url":"https://usn.ubuntu.com/1573-1/","reference_id":"USN-1573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1573-1/"},{"reference_url":"https://usn.ubuntu.com/1574-1/","reference_id":"USN-1574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1574-1/"},{"reference_url":"https://usn.ubuntu.com/1575-1/","reference_id":"USN-1575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1575-1/"},{"reference_url":"https://usn.ubuntu.com/1577-1/","reference_id":"USN-1577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1577-1/"},{"reference_url":"https://usn.ubuntu.com/1578-1/","reference_id":"USN-1578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1578-1/"},{"reference_url":"https://usn.ubuntu.com/1579-1/","reference_id":"USN-1579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1579-1/"},{"reference_url":"https://usn.ubuntu.com/1580-1/","reference_id":"USN-1580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1580-1/"}],"fixed_packages":[],"aliases":["CVE-2012-3430"],"risk_score":3.8,"exploitability":"2.0","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49m9-z9q9-13bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87098?format=json","vulnerability_id":"VCID-b5gh-4yau-tycv","summary":"kernel: drm/i915: integer overflow in i915_gem_do_execbuffer()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2384.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2384","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20178","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20236","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19753","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2384"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=824178","reference_id":"824178","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=824178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1304","reference_id":"RHSA-2012:1304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1304"},{"reference_url":"https://usn.ubuntu.com/1471-1/","reference_id":"USN-1471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1471-1/"},{"reference_url":"https://usn.ubuntu.com/1472-1/","reference_id":"USN-1472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1472-1/"},{"reference_url":"https://usn.ubuntu.com/1473-1/","reference_id":"USN-1473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1473-1/"},{"reference_url":"https://usn.ubuntu.com/1474-1/","reference_id":"USN-1474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1474-1/"},{"reference_url":"https://usn.ubuntu.com/1476-1/","reference_id":"USN-1476-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1476-1/"}],"fixed_packages":[],"aliases":["CVE-2012-2384"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b5gh-4yau-tycv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87406?format=json","vulnerability_id":"VCID-qutd-u7hs-m7a5","summary":"kernel: net: slab corruption due to improper synchronization around inet->opt","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1540.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1540.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3552.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3552","reference_id":"","reference_type":"","scores":[{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83933","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83834","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.8386","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02031","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552"},{"reference_url":"https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/31/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/31/11"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=853465","reference_id":"853465","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=853465"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3552","reference_id":"CVE-2012-3552","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1304","reference_id":"RHSA-2012:1304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1540","reference_id":"RHSA-2012:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1540"}],"fixed_packages":[],"aliases":["CVE-2012-3552"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qutd-u7hs-m7a5"}],"fixing_vulnerabilities":[],"risk_score":"3.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-279.9.1%3Farch=el6"}