{"url":"http://public2.vulnerablecode.io/api/packages/126140?format=json","purl":"pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53?arch=el6rt","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"3.0.18-rt34.53","qualifiers":{"arch":"el6rt"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87180?format=json","vulnerability_id":"VCID-3qpn-v9pw-vbgs","summary":"kernel: possible privilege escalation via SG_IO ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4127.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4127","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2553","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25404","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25428","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25394","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25255","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25238","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25257","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=752375","reference_id":"752375","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=752375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1849","reference_id":"RHSA-2011:1849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1850","reference_id":"RHSA-2011:1850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0107","reference_id":"RHSA-2012:0107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0358","reference_id":"RHSA-2012:0358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0358"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1388-1/","reference_id":"USN-1388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1388-1/"},{"reference_url":"https://usn.ubuntu.com/1389-1/","reference_id":"USN-1389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1389-1/"},{"reference_url":"https://usn.ubuntu.com/1405-1/","reference_id":"USN-1405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1405-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4127"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qpn-v9pw-vbgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87132?format=json","vulnerability_id":"VCID-5bkg-wjsx-zucw","summary":"kernel-rt: stack corruption when task gets scheduled out using the debug stack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0810.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0810","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15055","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15128","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15118","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15162","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=794557","reference_id":"794557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=794557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"}],"fixed_packages":[],"aliases":["CVE-2012-0810"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5bkg-wjsx-zucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87224?format=json","vulnerability_id":"VCID-6y6m-dsht-y7d8","summary":"kernel: jbd/jbd2: invalid value of first log block leads to oops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24077","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24089","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24107","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341","reference_id":"753341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4132"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6y6m-dsht-y7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87318?format=json","vulnerability_id":"VCID-8uu6-qhdz-qqff","summary":"kernel: perf: Fix software event overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2918.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2918","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33561","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33631","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33674","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33583","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33606","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2918"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=730706","reference_id":"730706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=730706"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c","reference_id":"CVE-2011-2918","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/17769.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1350","reference_id":"RHSA-2011:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2918"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uu6-qhdz-qqff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87221?format=json","vulnerability_id":"VCID-9a7h-rc7a-kufu","summary":"kernel: nfs4_getfacl decoding kernel oops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4131.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4131","reference_id":"","reference_type":"","scores":[{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57666","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5775","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57802","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57737","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57798","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57744","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57773","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747106","reference_id":"747106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0862","reference_id":"RHSA-2012:0862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1541","reference_id":"RHSA-2012:1541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1541"},{"reference_url":"https://usn.ubuntu.com/1457-1/","reference_id":"USN-1457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1457-1/"},{"reference_url":"https://usn.ubuntu.com/1470-1/","reference_id":"USN-1470-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1470-1/"},{"reference_url":"https://usn.ubuntu.com/1471-1/","reference_id":"USN-1471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1471-1/"},{"reference_url":"https://usn.ubuntu.com/1472-1/","reference_id":"USN-1472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1472-1/"},{"reference_url":"https://usn.ubuntu.com/1476-1/","reference_id":"USN-1476-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1476-1/"},{"reference_url":"https://usn.ubuntu.com/1530-1/","reference_id":"USN-1530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1530-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4131"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9a7h-rc7a-kufu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87184?format=json","vulnerability_id":"VCID-c6wb-wxwr-tuh3","summary":"kernel: xfs heap overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0038","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22025","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22047","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0038"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=773280","reference_id":"773280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=773280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1042","reference_id":"RHSA-2012:1042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1042"},{"reference_url":"https://usn.ubuntu.com/1356-1/","reference_id":"USN-1356-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1356-1/"},{"reference_url":"https://usn.ubuntu.com/1361-1/","reference_id":"USN-1361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1361-1/"},{"reference_url":"https://usn.ubuntu.com/1362-1/","reference_id":"USN-1362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1362-1/"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1364-1/","reference_id":"USN-1364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1364-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"},{"reference_url":"https://usn.ubuntu.com/1387-1/","reference_id":"USN-1387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1387-1/"},{"reference_url":"https://usn.ubuntu.com/1388-1/","reference_id":"USN-1388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1388-1/"},{"reference_url":"https://usn.ubuntu.com/1389-1/","reference_id":"USN-1389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1389-1/"},{"reference_url":"https://usn.ubuntu.com/1391-1/","reference_id":"USN-1391-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1391-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0038"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6wb-wxwr-tuh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87168?format=json","vulnerability_id":"VCID-pevh-sj6y-gqdp","summary":"kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0207","reference_id":"","reference_type":"","scores":[{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93745","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93754","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93756","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.9369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93721","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.9373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93726","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94763","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=772867","reference_id":"772867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772867"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c","reference_id":"OSVDB-78225;CVE-2012-0207","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0107","reference_id":"RHSA-2012:0107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0422","reference_id":"RHSA-2012:0422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0422"},{"reference_url":"https://usn.ubuntu.com/1356-1/","reference_id":"USN-1356-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1356-1/"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1364-1/","reference_id":"USN-1364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1364-1/"},{"reference_url":"https://usn.ubuntu.com/1380-1/","reference_id":"USN-1380-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1380-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0207"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pevh-sj6y-gqdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87427?format=json","vulnerability_id":"VCID-qdds-66x8-gqdb","summary":"kernel: xfs: potential buffer overflow in xfs_readlink()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45413","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45362","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4534","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45284","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156","reference_id":"749156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4077"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdds-66x8-gqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87208?format=json","vulnerability_id":"VCID-qrt5-vdfy-k3eb","summary":"kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0044","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14915","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17339","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17437","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1744","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0044"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=772894","reference_id":"772894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0743","reference_id":"RHSA-2012:0743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1042","reference_id":"RHSA-2012:1042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1042"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"},{"reference_url":"https://usn.ubuntu.com/1356-1/","reference_id":"USN-1356-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1356-1/"},{"reference_url":"https://usn.ubuntu.com/1361-1/","reference_id":"USN-1361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1361-1/"},{"reference_url":"https://usn.ubuntu.com/1362-1/","reference_id":"USN-1362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1362-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"},{"reference_url":"https://usn.ubuntu.com/1387-1/","reference_id":"USN-1387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1387-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"},{"reference_url":"https://usn.ubuntu.com/1555-1/","reference_id":"USN-1555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1555-1/"},{"reference_url":"https://usn.ubuntu.com/1556-1/","reference_id":"USN-1556-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1556-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0044"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrt5-vdfy-k3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87216?format=json","vulnerability_id":"VCID-rjeq-4es3-g3dg","summary":"kernel: keys: NULL pointer deref in the user-defined key type","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4110.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4110.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4110","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30966","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31043","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30954","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30976","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4110"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=751297","reference_id":"751297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=751297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1479","reference_id":"RHSA-2011:1479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1530","reference_id":"RHSA-2011:1530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0116","reference_id":"RHSA-2012:0116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://usn.ubuntu.com/1318-1/","reference_id":"USN-1318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1318-1/"},{"reference_url":"https://usn.ubuntu.com/1319-1/","reference_id":"USN-1319-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1319-1/"},{"reference_url":"https://usn.ubuntu.com/1323-1/","reference_id":"USN-1323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1323-1/"},{"reference_url":"https://usn.ubuntu.com/1324-1/","reference_id":"USN-1324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1324-1/"},{"reference_url":"https://usn.ubuntu.com/1325-1/","reference_id":"USN-1325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1325-1/"},{"reference_url":"https://usn.ubuntu.com/1328-1/","reference_id":"USN-1328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1328-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1332-1/","reference_id":"USN-1332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1332-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1337-1/","reference_id":"USN-1337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1337-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"},{"reference_url":"https://usn.ubuntu.com/1341-1/","reference_id":"USN-1341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1341-1/"},{"reference_url":"https://usn.ubuntu.com/1344-1/","reference_id":"USN-1344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1344-1/"},{"reference_url":"https://usn.ubuntu.com/1345-1/","reference_id":"USN-1345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1345-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4110"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjeq-4es3-g3dg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87225?format=json","vulnerability_id":"VCID-vjgt-vg3s-fbaa","summary":"kernel: oom_badness() integer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4097.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4097","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22829","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22907","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2294","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2268","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22576","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22739","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22722","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4097"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=750399","reference_id":"750399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=750399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1364-1/","reference_id":"USN-1364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1364-1/"},{"reference_url":"https://usn.ubuntu.com/1380-1/","reference_id":"USN-1380-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1380-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4097"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjgt-vg3s-fbaa"}],"fixing_vulnerabilities":[],"risk_score":"0.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53%3Farch=el6rt"}