{"url":"http://public2.vulnerablecode.io/api/packages/126244?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-274.17.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-274.17.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87166?format=json","vulnerability_id":"VCID-4c61-jy9m-23az","summary":"kernel: nfs: diotest4 from LTP crash client null pointer deref","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4325.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4325","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19365","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19267","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19398","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19278","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19167","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19124","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19098","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4325"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=755455","reference_id":"755455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=755455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"}],"fixed_packages":[],"aliases":["CVE-2011-4325"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c61-jy9m-23az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87224?format=json","vulnerability_id":"VCID-6y6m-dsht-y7d8","summary":"kernel: jbd/jbd2: invalid value of first log block leads to oops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24077","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341","reference_id":"753341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4132"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6y6m-dsht-y7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87510?format=json","vulnerability_id":"VCID-91gu-1pgh-jubb","summary":"kernel: no access restrictions of /proc/pid/* after setuid program exec","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/02/24/18","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/24/18"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/25/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1020","reference_id":"","reference_type":"","scores":[{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47821","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47864","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47706","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1020"},{"reference_url":"http://seclists.org/fulldisclosure/2011/Jan/421","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2011/Jan/421"},{"reference_url":"http://secunia.com/advisories/43496","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43496"},{"reference_url":"http://securityreason.com/securityalert/8107","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8107"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65693","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65693"},{"reference_url":"https://lkml.org/lkml/2011/2/10/21","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/10/21"},{"reference_url":"https://lkml.org/lkml/2011/2/7/368","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/7/368"},{"reference_url":"https://lkml.org/lkml/2011/2/7/404","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/7/404"},{"reference_url":"https://lkml.org/lkml/2011/2/7/414","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/7/414"},{"reference_url":"https://lkml.org/lkml/2011/2/7/466","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/7/466"},{"reference_url":"https://lkml.org/lkml/2011/2/7/474","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/7/474"},{"reference_url":"https://lkml.org/lkml/2011/2/9/417","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/2/9/417"},{"reference_url":"http://www.securityfocus.com/bid/46567","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46567"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=680358","reference_id":"680358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=680358"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41770.txt","reference_id":"CVE-2011-1020","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41770.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1020","reference_id":"CVE-2011-1020","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1020"},{"reference_url":"http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/","reference_id":"CVE-2011-1020","reference_type":"exploit","scores":[],"url":"http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1530","reference_id":"RHSA-2011:1530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0116","reference_id":"RHSA-2012:0116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0116"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1201-1/","reference_id":"USN-1201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1201-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1205-1/","reference_id":"USN-1205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1205-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1020"],"risk_score":8.2,"exploitability":"2.0","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-91gu-1pgh-jubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87219?format=json","vulnerability_id":"VCID-ausm-xxzm-6kh2","summary":"kernel: hfs: add sanity check for file name length","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4330.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4330.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4330","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36989","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36912","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36451","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36522","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4330"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=755431","reference_id":"755431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=755431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0358","reference_id":"RHSA-2012:0358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0358"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4330"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ausm-xxzm-6kh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87167?format=json","vulnerability_id":"VCID-k6x4-94sq-pfg6","summary":"kernel: incomplete fix for CVE-2011-2482","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae53b5bd77719fed58086c5be60ce4f22bffe1c6","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae53b5bd77719fed58086c5be60ce4f22bffe1c6"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4348.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4348.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4348","reference_id":"","reference_type":"","scores":[{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65034","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65158","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4348"},{"reference_url":"https://github.com/torvalds/linux/commit/ae53b5bd77719fed58086c5be60ce4f22bffe1c6","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/ae53b5bd77719fed58086c5be60ce4f22bffe1c6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/03/05/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/03/05/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=757143","reference_id":"757143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=757143"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4348","reference_id":"CVE-2011-4348","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"}],"fixed_packages":[],"aliases":["CVE-2011-4348"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6x4-94sq-pfg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87436?format=json","vulnerability_id":"VCID-kdgd-xanj-h7gp","summary":"kernel: proc: fix oops on invalid /proc/<pid>/maps access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3637","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19966","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19858","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1975","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1972","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19704","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747848","reference_id":"747848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://usn.ubuntu.com/1201-1/","reference_id":"USN-1201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1201-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1205-1/","reference_id":"USN-1205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1205-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-3637"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xanj-h7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87427?format=json","vulnerability_id":"VCID-qdds-66x8-gqdb","summary":"kernel: xfs: potential buffer overflow in xfs_readlink()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45413","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45362","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45322","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156","reference_id":"749156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4077"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdds-66x8-gqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88270?format=json","vulnerability_id":"VCID-x76n-2wwh-3feg","summary":"kernel: nfsv4: mknod(2) DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4324.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4324.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4324","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13708","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13554","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13419","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13575","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4324"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=755440","reference_id":"755440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=755440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://usn.ubuntu.com/1390-1/","reference_id":"USN-1390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1390-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4324"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x76n-2wwh-3feg"}],"fixing_vulnerabilities":[],"risk_score":"8.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-274.17.1%3Farch=el5"}