{"url":"http://public2.vulnerablecode.io/api/packages/126246?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-220.7.1?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-220.7.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87209?format=json","vulnerability_id":"VCID-13ek-v7ng-5khn","summary":"kernel: kvm: device assignment DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4347.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4347.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4347","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1538","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15326","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15251","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15249","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15183","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15276","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1526","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4347"},{"reference_url":"https://github.com/torvalds/linux/commit/c4e7f9022e506c6635a5037713c37118e23193e4","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/c4e7f9022e506c6635a5037713c37118e23193e4"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.10","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.10"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/11/24/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/11/24/7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=756084","reference_id":"756084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=756084"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4347","reference_id":"CVE-2011-4347","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0149","reference_id":"RHSA-2012:0149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1042","reference_id":"RHSA-2012:1042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1042"},{"reference_url":"https://usn.ubuntu.com/1421-1/","reference_id":"USN-1421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1421-1/"},{"reference_url":"https://usn.ubuntu.com/1422-1/","reference_id":"USN-1422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1422-1/"},{"reference_url":"https://usn.ubuntu.com/1425-1/","reference_id":"USN-1425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1425-1/"},{"reference_url":"https://usn.ubuntu.com/1426-1/","reference_id":"USN-1426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1426-1/"},{"reference_url":"https://usn.ubuntu.com/1431-1/","reference_id":"USN-1431-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1431-1/"},{"reference_url":"https://usn.ubuntu.com/1433-1/","reference_id":"USN-1433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1433-1/"},{"reference_url":"https://usn.ubuntu.com/1440-1/","reference_id":"USN-1440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1440-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4347"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13ek-v7ng-5khn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87224?format=json","vulnerability_id":"VCID-6y6m-dsht-y7d8","summary":"kernel: jbd/jbd2: invalid value of first log block leads to oops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24077","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24089","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24107","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24192","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341","reference_id":"753341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=753341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4132"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6y6m-dsht-y7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87188?format=json","vulnerability_id":"VCID-9jhs-pwhf-6ya6","summary":"kernel: kvm: pit timer with no irqchip crashes the system","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4622.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4622","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15492","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15336","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15456","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15561","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15579","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15654","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=769721","reference_id":"769721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=769721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0051","reference_id":"RHSA-2012:0051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1361-1/","reference_id":"USN-1361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1361-1/"},{"reference_url":"https://usn.ubuntu.com/1362-1/","reference_id":"USN-1362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1362-1/"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"},{"reference_url":"https://usn.ubuntu.com/1387-1/","reference_id":"USN-1387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1387-1/"},{"reference_url":"https://usn.ubuntu.com/1388-1/","reference_id":"USN-1388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1388-1/"},{"reference_url":"https://usn.ubuntu.com/1389-1/","reference_id":"USN-1389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1389-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4622"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jhs-pwhf-6ya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87184?format=json","vulnerability_id":"VCID-c6wb-wxwr-tuh3","summary":"kernel: xfs heap overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0038","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22025","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22047","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2213","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0038"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=773280","reference_id":"773280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=773280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1042","reference_id":"RHSA-2012:1042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1042"},{"reference_url":"https://usn.ubuntu.com/1356-1/","reference_id":"USN-1356-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1356-1/"},{"reference_url":"https://usn.ubuntu.com/1361-1/","reference_id":"USN-1361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1361-1/"},{"reference_url":"https://usn.ubuntu.com/1362-1/","reference_id":"USN-1362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1362-1/"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1364-1/","reference_id":"USN-1364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1364-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"},{"reference_url":"https://usn.ubuntu.com/1387-1/","reference_id":"USN-1387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1387-1/"},{"reference_url":"https://usn.ubuntu.com/1388-1/","reference_id":"USN-1388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1388-1/"},{"reference_url":"https://usn.ubuntu.com/1389-1/","reference_id":"USN-1389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1389-1/"},{"reference_url":"https://usn.ubuntu.com/1391-1/","reference_id":"USN-1391-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1391-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0038"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6wb-wxwr-tuh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87168?format=json","vulnerability_id":"VCID-pevh-sj6y-gqdp","summary":"kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0207","reference_id":"","reference_type":"","scores":[{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93774","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93745","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93754","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93756","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.9369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93721","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.9373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93726","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11746","scoring_system":"epss","scoring_elements":"0.93734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16151","scoring_system":"epss","scoring_elements":"0.94763","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=772867","reference_id":"772867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772867"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c","reference_id":"OSVDB-78225;CVE-2012-0207","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18378.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0107","reference_id":"RHSA-2012:0107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0422","reference_id":"RHSA-2012:0422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0422"},{"reference_url":"https://usn.ubuntu.com/1356-1/","reference_id":"USN-1356-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1356-1/"},{"reference_url":"https://usn.ubuntu.com/1363-1/","reference_id":"USN-1363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1363-1/"},{"reference_url":"https://usn.ubuntu.com/1364-1/","reference_id":"USN-1364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1364-1/"},{"reference_url":"https://usn.ubuntu.com/1380-1/","reference_id":"USN-1380-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1380-1/"},{"reference_url":"https://usn.ubuntu.com/1384-1/","reference_id":"USN-1384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1384-1/"},{"reference_url":"https://usn.ubuntu.com/1386-1/","reference_id":"USN-1386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1386-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0207"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pevh-sj6y-gqdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87427?format=json","vulnerability_id":"VCID-qdds-66x8-gqdb","summary":"kernel: xfs: potential buffer overflow in xfs_readlink()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45413","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45362","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4534","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45284","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45383","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4077"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156","reference_id":"749156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=749156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0007","reference_id":"RHSA-2012:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0333","reference_id":"RHSA-2012:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1291-1/","reference_id":"USN-1291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1291-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1300-1/","reference_id":"USN-1300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1300-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1330-1/","reference_id":"USN-1330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1330-1/"},{"reference_url":"https://usn.ubuntu.com/1336-1/","reference_id":"USN-1336-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1336-1/"},{"reference_url":"https://usn.ubuntu.com/1340-1/","reference_id":"USN-1340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1340-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4077"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdds-66x8-gqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87451?format=json","vulnerability_id":"VCID-qeu7-yh94-fqhh","summary":"kernel: perf, powerpc: Handle events that raise an exception without overflowing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4611.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4611","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14763","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14766","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14603","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14649","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14738","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14733","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14777","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14857","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4611"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=767914","reference_id":"767914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=767914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4611"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qeu7-yh94-fqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87175?format=json","vulnerability_id":"VCID-u55y-gtss-57a1","summary":"kernel: kvm: syscall instruction induced guest panic","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0045.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0045.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0045","reference_id":"","reference_type":"","scores":[{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73901","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73943","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74043","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74005","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.74084","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0045"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=773370","reference_id":"773370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=773370"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36545.txt","reference_id":"CVE-2012-0045;OSVDB-78264","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36545.txt"},{"reference_url":"https://www.securityfocus.com/bid/51389/info","reference_id":"CVE-2012-0045;OSVDB-78264","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/51389/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0422","reference_id":"RHSA-2012:0422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0422"},{"reference_url":"https://usn.ubuntu.com/1421-1/","reference_id":"USN-1421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1421-1/"},{"reference_url":"https://usn.ubuntu.com/1422-1/","reference_id":"USN-1422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1422-1/"},{"reference_url":"https://usn.ubuntu.com/1425-1/","reference_id":"USN-1425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1425-1/"},{"reference_url":"https://usn.ubuntu.com/1426-1/","reference_id":"USN-1426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1426-1/"},{"reference_url":"https://usn.ubuntu.com/1431-1/","reference_id":"USN-1431-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1431-1/"},{"reference_url":"https://usn.ubuntu.com/1433-1/","reference_id":"USN-1433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1433-1/"},{"reference_url":"https://usn.ubuntu.com/1440-1/","reference_id":"USN-1440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1440-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0045"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u55y-gtss-57a1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87230?format=json","vulnerability_id":"VCID-xu2s-e5wv-bybk","summary":"kernel: crypto: ghash: null pointer deref if no key is set","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4081.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4081","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18223","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17938","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18029","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18132","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18095","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18124","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18213","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=749475","reference_id":"749475","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=749475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0010","reference_id":"RHSA-2012:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1287-1/","reference_id":"USN-1287-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1287-1/"},{"reference_url":"https://usn.ubuntu.com/1292-1/","reference_id":"USN-1292-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1292-1/"},{"reference_url":"https://usn.ubuntu.com/1293-1/","reference_id":"USN-1293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1293-1/"},{"reference_url":"https://usn.ubuntu.com/1299-1/","reference_id":"USN-1299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1299-1/"},{"reference_url":"https://usn.ubuntu.com/1301-1/","reference_id":"USN-1301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1301-1/"},{"reference_url":"https://usn.ubuntu.com/1302-1/","reference_id":"USN-1302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1302-1/"},{"reference_url":"https://usn.ubuntu.com/1303-1/","reference_id":"USN-1303-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1303-1/"},{"reference_url":"https://usn.ubuntu.com/1304-1/","reference_id":"USN-1304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1304-1/"},{"reference_url":"https://usn.ubuntu.com/1311-1/","reference_id":"USN-1311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1311-1/"},{"reference_url":"https://usn.ubuntu.com/1312-1/","reference_id":"USN-1312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1312-1/"},{"reference_url":"https://usn.ubuntu.com/1313-1/","reference_id":"USN-1313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1313-1/"},{"reference_url":"https://usn.ubuntu.com/1322-1/","reference_id":"USN-1322-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1322-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4081"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xu2s-e5wv-bybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87283?format=json","vulnerability_id":"VCID-z16f-rf4n-qybf","summary":"kernel: send(m)msg: user pointer dereferences","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4594","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31342","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31339","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31247","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3127","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31625","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38255","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4594"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=761646","reference_id":"761646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=761646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0350","reference_id":"RHSA-2012:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0350"},{"reference_url":"https://usn.ubuntu.com/1260-1/","reference_id":"USN-1260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1260-1/"},{"reference_url":"https://usn.ubuntu.com/1275-1/","reference_id":"USN-1275-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1275-1/"}],"fixed_packages":[],"aliases":["CVE-2011-4594"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z16f-rf4n-qybf"}],"fixing_vulnerabilities":[],"risk_score":"1.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-220.7.1%3Farch=el6"}