Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/126140?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/126140?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "3.0.18-rt34.53", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87180?format=api", "vulnerability_id": "VCID-3qpn-v9pw-vbgs", "summary": "kernel: possible privilege escalation via SG_IO ioctl", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4127.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2553", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25599", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25404", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25438", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25428", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25394", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25358", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25351", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25306", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2519", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25255", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=752375", "reference_id": "752375", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1849", "reference_id": "RHSA-2011:1849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1850", "reference_id": "RHSA-2011:1850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0107", "reference_id": "RHSA-2012:0107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0358", "reference_id": "RHSA-2012:0358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0358" }, { "reference_url": "https://usn.ubuntu.com/1384-1/", "reference_id": "USN-1384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1384-1/" }, { "reference_url": "https://usn.ubuntu.com/1388-1/", "reference_id": "USN-1388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1388-1/" }, { "reference_url": "https://usn.ubuntu.com/1389-1/", "reference_id": "USN-1389-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1389-1/" }, { "reference_url": "https://usn.ubuntu.com/1405-1/", "reference_id": "USN-1405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1405-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4127" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qpn-v9pw-vbgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87132?format=api", "vulnerability_id": "VCID-5bkg-wjsx-zucw", "summary": "kernel-rt: stack corruption when task gets scheduled out using the debug stack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0810.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15004", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15055", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15094", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15097", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1504", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14913", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15036", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0810" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=794557", "reference_id": "794557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=794557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0810" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bkg-wjsx-zucw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87224?format=api", "vulnerability_id": "VCID-6y6m-dsht-y7d8", "summary": "kernel: jbd/jbd2: invalid value of first log block leads to oops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24337", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24497", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24327", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24316", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24291", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24111", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.23995", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24077", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=753341", "reference_id": "753341", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0007", "reference_id": "RHSA-2012:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0010", "reference_id": "RHSA-2012:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0350", "reference_id": "RHSA-2012:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0350" }, { "reference_url": "https://usn.ubuntu.com/1291-1/", "reference_id": "USN-1291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1291-1/" }, { "reference_url": "https://usn.ubuntu.com/1292-1/", "reference_id": "USN-1292-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1292-1/" }, { "reference_url": "https://usn.ubuntu.com/1293-1/", "reference_id": "USN-1293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1293-1/" }, { "reference_url": "https://usn.ubuntu.com/1299-1/", "reference_id": "USN-1299-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1299-1/" }, { "reference_url": "https://usn.ubuntu.com/1300-1/", "reference_id": "USN-1300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1300-1/" }, { "reference_url": "https://usn.ubuntu.com/1301-1/", "reference_id": "USN-1301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1301-1/" }, { "reference_url": "https://usn.ubuntu.com/1302-1/", "reference_id": "USN-1302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1302-1/" }, { "reference_url": "https://usn.ubuntu.com/1303-1/", "reference_id": "USN-1303-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1303-1/" }, { "reference_url": "https://usn.ubuntu.com/1304-1/", "reference_id": "USN-1304-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1304-1/" }, { "reference_url": "https://usn.ubuntu.com/1311-1/", "reference_id": "USN-1311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1311-1/" }, { "reference_url": "https://usn.ubuntu.com/1312-1/", "reference_id": "USN-1312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1312-1/" }, { "reference_url": "https://usn.ubuntu.com/1330-1/", "reference_id": "USN-1330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1330-1/" }, { "reference_url": "https://usn.ubuntu.com/1336-1/", "reference_id": "USN-1336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1336-1/" }, { "reference_url": "https://usn.ubuntu.com/1340-1/", "reference_id": "USN-1340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1340-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4132" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6y6m-dsht-y7d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87318?format=api", "vulnerability_id": "VCID-8uu6-qhdz-qqff", "summary": "kernel: perf: Fix software event overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30571", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3062", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30575", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34209", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34196", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34162", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33789", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33767", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33679", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33561", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33631", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2918" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=730706", "reference_id": "730706", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730706" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c", "reference_id": "CVE-2011-2918", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1350", "reference_id": "RHSA-2011:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1211-1/", "reference_id": "USN-1211-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1211-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2918" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uu6-qhdz-qqff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87221?format=api", "vulnerability_id": "VCID-9a7h-rc7a-kufu", "summary": "kernel: nfs4_getfacl decoding kernel oops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4131.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57666", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.5775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57802", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57756", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57734", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57692", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57737", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=747106", "reference_id": "747106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0862", "reference_id": "RHSA-2012:0862", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0862" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1541", "reference_id": "RHSA-2012:1541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1541" }, { "reference_url": "https://usn.ubuntu.com/1457-1/", "reference_id": "USN-1457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1457-1/" }, { "reference_url": "https://usn.ubuntu.com/1470-1/", "reference_id": "USN-1470-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1470-1/" }, { "reference_url": "https://usn.ubuntu.com/1471-1/", "reference_id": "USN-1471-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1471-1/" }, { "reference_url": "https://usn.ubuntu.com/1472-1/", "reference_id": "USN-1472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1472-1/" }, { "reference_url": "https://usn.ubuntu.com/1476-1/", "reference_id": "USN-1476-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1476-1/" }, { "reference_url": "https://usn.ubuntu.com/1530-1/", "reference_id": "USN-1530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1530-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4131" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9a7h-rc7a-kufu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87184?format=api", "vulnerability_id": "VCID-c6wb-wxwr-tuh3", "summary": "kernel: xfs heap overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19611", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22275", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22215", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22212", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22166", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22026", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21999", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21976", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0038" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=773280", "reference_id": "773280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0350", "reference_id": "RHSA-2012:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1042", "reference_id": "RHSA-2012:1042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1042" }, { "reference_url": "https://usn.ubuntu.com/1356-1/", "reference_id": "USN-1356-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1356-1/" }, { "reference_url": "https://usn.ubuntu.com/1361-1/", "reference_id": "USN-1361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1361-1/" }, { "reference_url": "https://usn.ubuntu.com/1362-1/", "reference_id": "USN-1362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1362-1/" }, { "reference_url": "https://usn.ubuntu.com/1363-1/", "reference_id": "USN-1363-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1363-1/" }, { "reference_url": "https://usn.ubuntu.com/1364-1/", "reference_id": "USN-1364-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1364-1/" }, { "reference_url": "https://usn.ubuntu.com/1384-1/", "reference_id": "USN-1384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1384-1/" }, { "reference_url": "https://usn.ubuntu.com/1386-1/", "reference_id": "USN-1386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1386-1/" }, { "reference_url": "https://usn.ubuntu.com/1387-1/", "reference_id": "USN-1387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1387-1/" }, { "reference_url": "https://usn.ubuntu.com/1388-1/", "reference_id": "USN-1388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1388-1/" }, { "reference_url": "https://usn.ubuntu.com/1389-1/", "reference_id": "USN-1389-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1389-1/" }, { "reference_url": "https://usn.ubuntu.com/1391-1/", "reference_id": "USN-1391-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1391-1/" }, { "reference_url": "https://usn.ubuntu.com/1394-1/", "reference_id": "USN-1394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1394-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0038" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6wb-wxwr-tuh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87168?format=api", "vulnerability_id": "VCID-pevh-sj6y-gqdp", "summary": "kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93745", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.9373", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93727", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93726", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93734", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.9369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93697", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93721", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11746", "scoring_system": "epss", "scoring_elements": "0.93724", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.16151", "scoring_system": "epss", "scoring_elements": "0.94773", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16151", "scoring_system": "epss", "scoring_elements": "0.94777", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16151", "scoring_system": "epss", "scoring_elements": "0.94778", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16151", "scoring_system": "epss", "scoring_elements": "0.94763", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0207" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=772867", "reference_id": "772867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772867" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c", "reference_id": "OSVDB-78225;CVE-2012-0207", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0107", "reference_id": "RHSA-2012:0107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0350", "reference_id": "RHSA-2012:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0422", "reference_id": "RHSA-2012:0422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0422" }, { "reference_url": "https://usn.ubuntu.com/1356-1/", "reference_id": "USN-1356-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1356-1/" }, { "reference_url": "https://usn.ubuntu.com/1363-1/", "reference_id": "USN-1363-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1363-1/" }, { "reference_url": "https://usn.ubuntu.com/1364-1/", "reference_id": "USN-1364-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1364-1/" }, { "reference_url": "https://usn.ubuntu.com/1380-1/", "reference_id": "USN-1380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1380-1/" }, { "reference_url": "https://usn.ubuntu.com/1384-1/", "reference_id": "USN-1384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1384-1/" }, { "reference_url": "https://usn.ubuntu.com/1386-1/", "reference_id": "USN-1386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1386-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0207" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pevh-sj6y-gqdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87427?format=api", "vulnerability_id": "VCID-qdds-66x8-gqdb", "summary": "kernel: xfs: potential buffer overflow in xfs_readlink()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45413", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45529", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45499", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45504", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45552", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45548", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45498", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45414", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45423", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45362", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45257", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45322", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4077" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=749156", "reference_id": "749156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0007", "reference_id": "RHSA-2012:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0350", "reference_id": "RHSA-2012:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0350" }, { "reference_url": "https://usn.ubuntu.com/1291-1/", "reference_id": "USN-1291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1291-1/" }, { "reference_url": "https://usn.ubuntu.com/1292-1/", "reference_id": "USN-1292-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1292-1/" }, { "reference_url": "https://usn.ubuntu.com/1293-1/", "reference_id": "USN-1293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1293-1/" }, { "reference_url": "https://usn.ubuntu.com/1299-1/", "reference_id": "USN-1299-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1299-1/" }, { "reference_url": "https://usn.ubuntu.com/1300-1/", "reference_id": "USN-1300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1300-1/" }, { "reference_url": "https://usn.ubuntu.com/1301-1/", "reference_id": "USN-1301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1301-1/" }, { "reference_url": "https://usn.ubuntu.com/1302-1/", "reference_id": "USN-1302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1302-1/" }, { "reference_url": "https://usn.ubuntu.com/1303-1/", "reference_id": "USN-1303-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1303-1/" }, { "reference_url": "https://usn.ubuntu.com/1304-1/", "reference_id": "USN-1304-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1304-1/" }, { "reference_url": "https://usn.ubuntu.com/1311-1/", "reference_id": "USN-1311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1311-1/" }, { "reference_url": "https://usn.ubuntu.com/1312-1/", "reference_id": "USN-1312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1312-1/" }, { "reference_url": "https://usn.ubuntu.com/1330-1/", "reference_id": "USN-1330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1330-1/" }, { "reference_url": "https://usn.ubuntu.com/1336-1/", "reference_id": "USN-1336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1336-1/" }, { "reference_url": "https://usn.ubuntu.com/1340-1/", "reference_id": "USN-1340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1340-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4077" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdds-66x8-gqdb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87208?format=api", "vulnerability_id": "VCID-qrt5-vdfy-k3eb", "summary": "kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1504", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17578", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17524", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17532", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17386", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17339", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0044" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=772894", "reference_id": "772894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0743", "reference_id": "RHSA-2012:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1042", "reference_id": "RHSA-2012:1042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1042" }, { "reference_url": "https://usn.ubuntu.com/1330-1/", "reference_id": "USN-1330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1330-1/" }, { "reference_url": "https://usn.ubuntu.com/1336-1/", "reference_id": "USN-1336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1336-1/" }, { "reference_url": "https://usn.ubuntu.com/1340-1/", "reference_id": "USN-1340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1340-1/" }, { "reference_url": "https://usn.ubuntu.com/1356-1/", "reference_id": "USN-1356-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1356-1/" }, { "reference_url": "https://usn.ubuntu.com/1361-1/", "reference_id": "USN-1361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1361-1/" }, { "reference_url": "https://usn.ubuntu.com/1362-1/", "reference_id": "USN-1362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1362-1/" }, { "reference_url": "https://usn.ubuntu.com/1386-1/", "reference_id": "USN-1386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1386-1/" }, { "reference_url": "https://usn.ubuntu.com/1387-1/", "reference_id": "USN-1387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1387-1/" }, { "reference_url": "https://usn.ubuntu.com/1394-1/", "reference_id": "USN-1394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1394-1/" }, { "reference_url": "https://usn.ubuntu.com/1555-1/", "reference_id": "USN-1555-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1555-1/" }, { "reference_url": "https://usn.ubuntu.com/1556-1/", "reference_id": "USN-1556-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1556-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0044" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrt5-vdfy-k3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87216?format=api", "vulnerability_id": "VCID-rjeq-4es3-g3dg", "summary": "kernel: keys: NULL pointer deref in the user-defined key type", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4110.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4110.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4110", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31509", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31559", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31515", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31549", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31495", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3132", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31195", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31115", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30966", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31036", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4110" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=751297", "reference_id": "751297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=751297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1479", "reference_id": "RHSA-2011:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1530", "reference_id": "RHSA-2011:1530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0010", "reference_id": "RHSA-2012:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0116", "reference_id": "RHSA-2012:0116", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0116" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://usn.ubuntu.com/1318-1/", "reference_id": "USN-1318-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1318-1/" }, { "reference_url": "https://usn.ubuntu.com/1319-1/", "reference_id": "USN-1319-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1319-1/" }, { "reference_url": "https://usn.ubuntu.com/1323-1/", "reference_id": "USN-1323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1323-1/" }, { "reference_url": "https://usn.ubuntu.com/1324-1/", "reference_id": "USN-1324-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1324-1/" }, { "reference_url": "https://usn.ubuntu.com/1325-1/", "reference_id": "USN-1325-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1325-1/" }, { "reference_url": "https://usn.ubuntu.com/1328-1/", "reference_id": "USN-1328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1328-1/" }, { "reference_url": "https://usn.ubuntu.com/1330-1/", "reference_id": "USN-1330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1330-1/" }, { "reference_url": "https://usn.ubuntu.com/1332-1/", "reference_id": "USN-1332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1332-1/" }, { "reference_url": "https://usn.ubuntu.com/1336-1/", "reference_id": "USN-1336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1336-1/" }, { "reference_url": "https://usn.ubuntu.com/1337-1/", "reference_id": "USN-1337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1337-1/" }, { "reference_url": "https://usn.ubuntu.com/1340-1/", "reference_id": "USN-1340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1340-1/" }, { "reference_url": "https://usn.ubuntu.com/1341-1/", "reference_id": "USN-1341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1341-1/" }, { "reference_url": "https://usn.ubuntu.com/1344-1/", "reference_id": "USN-1344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1344-1/" }, { "reference_url": "https://usn.ubuntu.com/1345-1/", "reference_id": "USN-1345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1345-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4110" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjeq-4es3-g3dg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87225?format=api", "vulnerability_id": "VCID-vjgt-vg3s-fbaa", "summary": "kernel: oom_badness() integer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4097.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22907", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2294", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22891", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22853", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22689", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22683", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2268", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22576", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22661", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4097" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=750399", "reference_id": "750399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0333", "reference_id": "RHSA-2012:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0333" }, { "reference_url": "https://usn.ubuntu.com/1363-1/", "reference_id": "USN-1363-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1363-1/" }, { "reference_url": "https://usn.ubuntu.com/1364-1/", "reference_id": "USN-1364-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1364-1/" }, { "reference_url": "https://usn.ubuntu.com/1380-1/", "reference_id": "USN-1380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1380-1/" }, { "reference_url": "https://usn.ubuntu.com/1384-1/", "reference_id": "USN-1384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1384-1/" }, { "reference_url": "https://usn.ubuntu.com/1386-1/", "reference_id": "USN-1386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1386-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-4097" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjgt-vg3s-fbaa" } ], "fixing_vulnerabilities": [], "risk_score": "0.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53%3Farch=el6rt" }