Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/125966?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/125966?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-220.23.1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-220.23.1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87069?format=api", "vulnerability_id": "VCID-486y-9v9t-x3hx", "summary": "kernel: net: insufficient data_len validation in sock_alloc_send_pskb()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23217", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2329", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23277", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23069", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23063", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23056", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22947", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23031", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816289", "reference_id": "816289", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0690", "reference_id": "RHSA-2012:0690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1087", "reference_id": "RHSA-2012:1087", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1087" }, { "reference_url": "https://usn.ubuntu.com/1514-1/", "reference_id": "USN-1514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1514-1/" }, { "reference_url": "https://usn.ubuntu.com/1529-1/", "reference_id": "USN-1529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1529-1/" }, { "reference_url": "https://usn.ubuntu.com/1530-1/", "reference_id": "USN-1530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1530-1/" }, { "reference_url": "https://usn.ubuntu.com/1531-1/", "reference_id": "USN-1531-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1531-1/" }, { "reference_url": "https://usn.ubuntu.com/1532-1/", "reference_id": "USN-1532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1532-1/" }, { "reference_url": "https://usn.ubuntu.com/1533-1/", "reference_id": "USN-1533-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1533-1/" }, { "reference_url": "https://usn.ubuntu.com/1534-1/", "reference_id": "USN-1534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1534-1/" }, { "reference_url": "https://usn.ubuntu.com/1535-1/", "reference_id": "USN-1535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1535-1/" }, { "reference_url": "https://usn.ubuntu.com/1538-1/", "reference_id": "USN-1538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1538-1/" }, { "reference_url": "https://usn.ubuntu.com/1539-1/", "reference_id": "USN-1539-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1539-1/" }, { "reference_url": "https://usn.ubuntu.com/1598-1/", "reference_id": "USN-1598-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1598-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2136" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-486y-9v9t-x3hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87103?format=api", "vulnerability_id": "VCID-aszd-q4dg-bbgw", "summary": "kernel: macvtap: zerocopy: vector length is not validated before pinning user pages", "references": [ { "reference_url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" }, { "reference_url": "http://marc.info/?l=linux-netdev&m=133455718001608&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=linux-netdev&m=133455718001608&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2119.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2119.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56509", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.5655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56615", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.566", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56599", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.5657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56506", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56524", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56505", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56459", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119" }, { "reference_url": "https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73" }, { "reference_url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73" }, { "reference_url": "http://ubuntu.com/usn/usn-1529-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1529-1" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/04/19/14", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/04/19/14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=814278", "reference_id": "814278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814278" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2119", "reference_id": "CVE-2012-2119", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://usn.ubuntu.com/1514-1/", "reference_id": "USN-1514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1514-1/" }, { "reference_url": "https://usn.ubuntu.com/1529-1/", "reference_id": "USN-1529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1529-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2119" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aszd-q4dg-bbgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87102?format=api", "vulnerability_id": "VCID-cae1-x9uv-c3fu", "summary": "kernel: fcaps: clear the same personality flags as suid when fcaps are used", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2123.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2123.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17856", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18072", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17794", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17832", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17739", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17716", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17673", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17529", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17622", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2123" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=806722", "reference_id": "806722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0670", "reference_id": "RHSA-2012:0670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://usn.ubuntu.com/1445-1/", "reference_id": "USN-1445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1445-1/" }, { "reference_url": "https://usn.ubuntu.com/1448-1/", "reference_id": "USN-1448-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1448-1/" }, { "reference_url": "https://usn.ubuntu.com/1452-1/", "reference_id": "USN-1452-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1452-1/" }, { "reference_url": "https://usn.ubuntu.com/1453-1/", "reference_id": "USN-1453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1453-1/" }, { "reference_url": "https://usn.ubuntu.com/1455-1/", "reference_id": "USN-1455-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1455-1/" }, { "reference_url": "https://usn.ubuntu.com/1457-1/", "reference_id": "USN-1457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1457-1/" }, { "reference_url": "https://usn.ubuntu.com/1459-1/", "reference_id": "USN-1459-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1459-1/" }, { "reference_url": "https://usn.ubuntu.com/1460-1/", "reference_id": "USN-1460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1460-1/" }, { "reference_url": "https://usn.ubuntu.com/1470-1/", "reference_id": "USN-1470-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1470-1/" }, { "reference_url": "https://usn.ubuntu.com/1530-1/", "reference_id": "USN-1530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1530-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2123" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cae1-x9uv-c3fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87065?format=api", "vulnerability_id": "VCID-cz7k-mjp3-g3hn", "summary": "kernel: rds-ping cause kernel panic", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2372.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.2991", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30388", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30271", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30331", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30164", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30049", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29974", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29839", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" }, { "reference_url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8" }, { "reference_url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html" }, { "reference_url": "http://ubuntu.com/usn/usn-1529-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1529-1" }, { "reference_url": "http://www.securityfocus.com/bid/54062", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54062" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1555-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1555-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1556-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1556-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=822754", "reference_id": "822754", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822754" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2372", "reference_id": "CVE-2012-2372", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1540", "reference_id": "RHSA-2012:1540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1540" }, { "reference_url": "https://usn.ubuntu.com/1514-1/", "reference_id": "USN-1514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1514-1/" }, { "reference_url": "https://usn.ubuntu.com/1529-1/", "reference_id": "USN-1529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1529-1/" }, { "reference_url": "https://usn.ubuntu.com/1530-1/", "reference_id": "USN-1530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1530-1/" }, { "reference_url": "https://usn.ubuntu.com/1531-1/", "reference_id": "USN-1531-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1531-1/" }, { "reference_url": "https://usn.ubuntu.com/1538-1/", "reference_id": "USN-1538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1538-1/" }, { "reference_url": "https://usn.ubuntu.com/1554-1/", "reference_id": "USN-1554-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1554-1/" }, { "reference_url": "https://usn.ubuntu.com/1555-1/", "reference_id": "USN-1555-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1555-1/" }, { "reference_url": "https://usn.ubuntu.com/1556-1/", "reference_id": "USN-1556-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1556-1/" }, { "reference_url": "https://usn.ubuntu.com/1558-1/", "reference_id": "USN-1558-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1558-1/" }, { "reference_url": "https://usn.ubuntu.com/1563-1/", "reference_id": "USN-1563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1563-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2372" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cz7k-mjp3-g3hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87123?format=api", "vulnerability_id": "VCID-dzp6-pjj8-ruhf", "summary": "kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1179.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.57921", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58006", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58028", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58078", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58008", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.57964", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1179" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=803793", "reference_id": "803793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1042", "reference_id": "RHSA-2012:1042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1042" }, { "reference_url": "https://usn.ubuntu.com/1431-1/", "reference_id": "USN-1431-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1431-1/" }, { "reference_url": "https://usn.ubuntu.com/1433-1/", "reference_id": "USN-1433-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1433-1/" }, { "reference_url": "https://usn.ubuntu.com/1446-1/", "reference_id": "USN-1446-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1446-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1179" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzp6-pjj8-ruhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87077?format=api", "vulnerability_id": "VCID-n2hd-pete-vka3", "summary": "kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2373.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2373.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2373", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20302", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20446", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20231", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2037", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20355", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20296", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20287", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20127", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20039", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20113", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2373" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=822821", "reference_id": "822821", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://usn.ubuntu.com/1514-1/", "reference_id": "USN-1514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1514-1/" }, { "reference_url": "https://usn.ubuntu.com/1529-1/", "reference_id": "USN-1529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1529-1/" }, { "reference_url": "https://usn.ubuntu.com/1532-1/", "reference_id": "USN-1532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1532-1/" }, { "reference_url": "https://usn.ubuntu.com/1533-1/", "reference_id": "USN-1533-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1533-1/" }, { "reference_url": "https://usn.ubuntu.com/1539-1/", "reference_id": "USN-1539-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1539-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2373" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n2hd-pete-vka3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87208?format=api", "vulnerability_id": "VCID-qrt5-vdfy-k3eb", "summary": "kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1504", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17578", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17524", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17532", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17386", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17339", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0044" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=772894", "reference_id": "772894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1042", "reference_id": "RHSA-2012:1042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1042" }, { "reference_url": "https://usn.ubuntu.com/1330-1/", "reference_id": "USN-1330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1330-1/" }, { "reference_url": "https://usn.ubuntu.com/1336-1/", "reference_id": "USN-1336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1336-1/" }, { "reference_url": "https://usn.ubuntu.com/1340-1/", "reference_id": "USN-1340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1340-1/" }, { "reference_url": "https://usn.ubuntu.com/1356-1/", "reference_id": "USN-1356-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1356-1/" }, { "reference_url": "https://usn.ubuntu.com/1361-1/", "reference_id": "USN-1361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1361-1/" }, { "reference_url": "https://usn.ubuntu.com/1362-1/", "reference_id": "USN-1362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1362-1/" }, { "reference_url": "https://usn.ubuntu.com/1386-1/", "reference_id": "USN-1386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1386-1/" }, { "reference_url": "https://usn.ubuntu.com/1387-1/", "reference_id": "USN-1387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1387-1/" }, { "reference_url": "https://usn.ubuntu.com/1394-1/", "reference_id": "USN-1394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1394-1/" }, { "reference_url": "https://usn.ubuntu.com/1555-1/", "reference_id": "USN-1555-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1555-1/" }, { "reference_url": "https://usn.ubuntu.com/1556-1/", "reference_id": "USN-1556-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1556-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0044" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrt5-vdfy-k3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87111?format=api", "vulnerability_id": "VCID-ushy-m8mj-qbe6", "summary": "kvm: device assignment page leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.3224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32065", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32061", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31896", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31769", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31687", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31539", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31611", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2121" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=814149", "reference_id": "814149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0676", "reference_id": "RHSA-2012:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://usn.ubuntu.com/1457-1/", "reference_id": "USN-1457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1457-1/" }, { "reference_url": "https://usn.ubuntu.com/1470-1/", "reference_id": "USN-1470-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1470-1/" }, { "reference_url": "https://usn.ubuntu.com/1471-1/", "reference_id": "USN-1471-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1471-1/" }, { "reference_url": "https://usn.ubuntu.com/1472-1/", "reference_id": "USN-1472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1472-1/" }, { "reference_url": "https://usn.ubuntu.com/1473-1/", "reference_id": "USN-1473-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1473-1/" }, { "reference_url": "https://usn.ubuntu.com/1474-1/", "reference_id": "USN-1474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1474-1/" }, { "reference_url": "https://usn.ubuntu.com/1476-1/", "reference_id": "USN-1476-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1476-1/" }, { "reference_url": "https://usn.ubuntu.com/1577-1/", "reference_id": "USN-1577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1577-1/" }, { "reference_url": "https://usn.ubuntu.com/2036-1/", "reference_id": "USN-2036-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2036-1/" }, { "reference_url": "https://usn.ubuntu.com/2037-1/", "reference_id": "USN-2037-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2037-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2121" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ushy-m8mj-qbe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87064?format=api", "vulnerability_id": "VCID-xgu5-vemd-jqh6", "summary": "kernel: kvm: buffer overflow in kvm_set_irq()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2137.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32274", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32699", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32747", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32737", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32751", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32697", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32545", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3243", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32347", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3221", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137" }, { "reference_url": "http://secunia.com/advisories/50952", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50952" }, { "reference_url": "http://secunia.com/advisories/50961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50961" }, { "reference_url": "http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html" }, { "reference_url": "http://ubuntu.com/usn/usn-1529-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1529-1" }, { "reference_url": "http://ubuntu.com/usn/usn-1607-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1607-1" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24" }, { "reference_url": "http://www.securityfocus.com/bid/54063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54063" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1594-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1594-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1606-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1606-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1609-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1609-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816151", "reference_id": "816151", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816151" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2137", "reference_id": "CVE-2012-2137", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://usn.ubuntu.com/1514-1/", "reference_id": "USN-1514-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1514-1/" }, { "reference_url": "https://usn.ubuntu.com/1529-1/", "reference_id": "USN-1529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1529-1/" }, { "reference_url": "https://usn.ubuntu.com/1594-1/", "reference_id": "USN-1594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1594-1/" }, { "reference_url": "https://usn.ubuntu.com/1606-1/", "reference_id": "USN-1606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1606-1/" }, { "reference_url": "https://usn.ubuntu.com/1607-1/", "reference_id": "USN-1607-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1607-1/" }, { "reference_url": "https://usn.ubuntu.com/1609-1/", "reference_id": "USN-1609-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1609-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-2137" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgu5-vemd-jqh6" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-220.23.1%3Farch=el6" }