{"url":"http://public2.vulnerablecode.io/api/packages/125995?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-308.8.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-308.8.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87069?format=json","vulnerability_id":"VCID-486y-9v9t-x3hx","summary":"kernel: net: insufficient data_len validation in sock_alloc_send_pskb()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2136","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23323","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23283","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22947","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23031","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23106","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23072","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23088","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=816289","reference_id":"816289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=816289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0690","reference_id":"RHSA-2012:0690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0743","reference_id":"RHSA-2012:0743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1087","reference_id":"RHSA-2012:1087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1087"},{"reference_url":"https://usn.ubuntu.com/1514-1/","reference_id":"USN-1514-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1514-1/"},{"reference_url":"https://usn.ubuntu.com/1529-1/","reference_id":"USN-1529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1529-1/"},{"reference_url":"https://usn.ubuntu.com/1530-1/","reference_id":"USN-1530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1530-1/"},{"reference_url":"https://usn.ubuntu.com/1531-1/","reference_id":"USN-1531-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1531-1/"},{"reference_url":"https://usn.ubuntu.com/1532-1/","reference_id":"USN-1532-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1532-1/"},{"reference_url":"https://usn.ubuntu.com/1533-1/","reference_id":"USN-1533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1533-1/"},{"reference_url":"https://usn.ubuntu.com/1534-1/","reference_id":"USN-1534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1534-1/"},{"reference_url":"https://usn.ubuntu.com/1535-1/","reference_id":"USN-1535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1535-1/"},{"reference_url":"https://usn.ubuntu.com/1538-1/","reference_id":"USN-1538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1538-1/"},{"reference_url":"https://usn.ubuntu.com/1539-1/","reference_id":"USN-1539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1539-1/"},{"reference_url":"https://usn.ubuntu.com/1598-1/","reference_id":"USN-1598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1598-1/"}],"fixed_packages":[],"aliases":["CVE-2012-2136"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-486y-9v9t-x3hx"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-308.8.1%3Farch=el5"}