Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127107?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127107?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.18-238.19.1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87810?format=api", "vulnerability_id": "VCID-1rgx-tmw4-uqgt", "summary": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.7317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.7325", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73261", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73255", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73281", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383", "reference_id": "695383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1236-1/", "reference_id": "USN-1236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1236-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1573" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgx-tmw4-uqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87415?format=api", "vulnerability_id": "VCID-4gcp-bfru-57ay", "summary": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/21/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/21/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/22/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/22/7" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13079", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13156", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13193", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13141", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13046", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13119", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12925", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2022" }, { "reference_url": "https://lkml.org/lkml/2011/4/14/293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2011/4/14/293" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5" }, { "reference_url": "http://www.securityfocus.com/bid/47843", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47843" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996", "reference_id": "698996", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022", "reference_id": "CVE-2011-2022", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1350", "reference_id": "RHSA-2011:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1350" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1170-1/", "reference_id": "USN-1170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1170-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2022" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gcp-bfru-57ay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87341?format=api", "vulnerability_id": "VCID-8nyx-mdyc-t3ez", "summary": "kernel: xen: vmx: insecure cpuid vmexit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1936", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24421", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2436", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24429", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24473", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24444", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24402", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24393", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24365", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24226", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24186", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2407", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24151", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1936" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=706323", "reference_id": "706323", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1936" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyx-mdyc-t3ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87392?format=api", "vulnerability_id": "VCID-a9mu-gdgc-cbct", "summary": "kernel: validate size of EFI GUID partition entries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1844", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18349", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18385", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18329", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18269", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18255", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18215", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18077", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18166", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1776" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026", "reference_id": "703026", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1225-1/", "reference_id": "USN-1225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1225-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1776" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9mu-gdgc-cbct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87390?format=api", "vulnerability_id": "VCID-au4y-xz41-zyfy", "summary": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17377", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1732", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17328", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17359", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17246", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17187", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17044", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17133", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019", "reference_id": "703019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1189-1/", "reference_id": "USN-1189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1189-1/" }, { "reference_url": "https://usn.ubuntu.com/1201-1/", "reference_id": "USN-1201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1201-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1205-1/", "reference_id": "USN-1205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1205-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1211-1/", "reference_id": "USN-1211-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1211-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2492" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-au4y-xz41-zyfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87442?format=api", "vulnerability_id": "VCID-dd7k-u8ev-abhz", "summary": "kernel signal spoofing issue", "references": [ { "reference_url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23315", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23601", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23663", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23351", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23334", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23231", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1182" }, { "reference_url": "https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/03/23/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/03/23/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028", "reference_id": "690028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690028" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182", "reference_id": "CVE-2011-1182", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0883", "reference_id": "RHSA-2011:0883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1182" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dd7k-u8ev-abhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87414?format=api", "vulnerability_id": "VCID-dx7m-ma2j-6ket", "summary": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/21/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/21/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/22/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/22/7" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13079", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13156", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13193", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13141", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13046", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13119", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12925", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1745" }, { "reference_url": "https://lkml.org/lkml/2011/4/14/293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2011/4/14/293" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5" }, { "reference_url": "http://www.securityfocus.com/bid/47534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47534" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996", "reference_id": "698996", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745", "reference_id": "CVE-2011-1745", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1350", "reference_id": "RHSA-2011:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1350" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1170-1/", "reference_id": "USN-1170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1170-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1745" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dx7m-ma2j-6ket" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87416?format=api", "vulnerability_id": "VCID-fhyj-cymx-pfgp", "summary": "kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/21/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/21/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/22/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/22/7" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12159", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12237", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12199", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12279", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12336", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12246", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12213", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12103", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12022", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1746" }, { "reference_url": "https://lkml.org/lkml/2011/4/14/294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2011/4/14/294" }, { "reference_url": "https://lkml.org/lkml/2011/4/19/400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2011/4/19/400" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5" }, { "reference_url": "http://www.securityfocus.com/bid/47535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998", "reference_id": "698998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746", "reference_id": "CVE-2011-1746", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1350", "reference_id": "RHSA-2011:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1350" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1170-1/", "reference_id": "USN-1170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1170-1/" }, { "reference_url": "https://usn.ubuntu.com/1183-1/", "reference_id": "USN-1183-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1183-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1746" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhyj-cymx-pfgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87421?format=api", "vulnerability_id": "VCID-j67y-7adf-3ygp", "summary": "kernel: proc: signedness issue in next_pidmap()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1" }, { "reference_url": "http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source", "reference_id": "", "reference_type": "", "scores": [], "url": "http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/19/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/19/1" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/20/1" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12466", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12658", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12641", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12609", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12438", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1256", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12528", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12413", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12326", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1593" }, { "reference_url": "http://secunia.com/advisories/44164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44164" }, { "reference_url": "http://securitytracker.com/id?1025420", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025420" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66876", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66876" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4" }, { "reference_url": "http://www.securityfocus.com/bid/47497", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47497" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1146-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1146-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822", "reference_id": "697822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593", "reference_id": "CVE-2011-1593", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1146-1/", "reference_id": "USN-1146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1146-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1161-1/", "reference_id": "USN-1161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1161-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1168-1/", "reference_id": "USN-1168-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1168-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1593" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j67y-7adf-3ygp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87586?format=api", "vulnerability_id": "VCID-ku5j-hkct-aug2", "summary": "kernel: panic in ib_cm:cm_work_handler", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63351", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63298", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63324", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63337", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63335", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0695" }, { "reference_url": "http://secunia.com/advisories/43693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43693" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66056" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/03/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/03/11/1" }, { "reference_url": "http://www.securityfocus.com/bid/46839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46839" }, { "reference_url": "http://www.spinics.net/lists/linux-rdma/msg07447.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/linux-rdma/msg07447.html" }, { "reference_url": "http://www.spinics.net/lists/linux-rdma/msg07448.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/linux-rdma/msg07448.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1146-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1146-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=653648", "reference_id": "653648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653648" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0695", "reference_id": "CVE-2011-0695", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0421", "reference_id": "RHSA-2011:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1111-1/", "reference_id": "USN-1111-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1111-1/" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1146-1/", "reference_id": "USN-1146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1146-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0695" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87376?format=api", "vulnerability_id": "VCID-nktq-p6vq-hkgq", "summary": "kernel: inet_diag: insufficient validation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19617", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19523", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19426", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19388", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19279", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19368", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2213" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536", "reference_id": "714536", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1203-1/", "reference_id": "USN-1203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1203-1/" }, { "reference_url": "https://usn.ubuntu.com/1208-1/", "reference_id": "USN-1208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1208-1/" }, { "reference_url": "https://usn.ubuntu.com/1216-1/", "reference_id": "USN-1216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1216-1/" }, { "reference_url": "https://usn.ubuntu.com/1218-1/", "reference_id": "USN-1218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1218-1/" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1225-1/", "reference_id": "USN-1225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1225-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1228-1/", "reference_id": "USN-1228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1228-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1246-1/", "reference_id": "USN-1246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1246-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2213" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nktq-p6vq-hkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87373?format=api", "vulnerability_id": "VCID-wg43-zbfb-nfaq", "summary": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73574", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.7365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73701", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73703", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73728", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173", "reference_id": "695173", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1106", "reference_id": "RHSA-2011:1106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1189", "reference_id": "RHSA-2011:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1253", "reference_id": "RHSA-2011:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1253" }, { "reference_url": "https://usn.ubuntu.com/1219-1/", "reference_id": "USN-1219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1219-1/" }, { "reference_url": "https://usn.ubuntu.com/1220-1/", "reference_id": "USN-1220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1220-1/" }, { "reference_url": "https://usn.ubuntu.com/1227-1/", "reference_id": "USN-1227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1227-1/" }, { "reference_url": "https://usn.ubuntu.com/1239-1/", "reference_id": "USN-1239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1239-1/" }, { "reference_url": "https://usn.ubuntu.com/1240-1/", "reference_id": "USN-1240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1240-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1245-1/", "reference_id": "USN-1245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1245-1/" }, { "reference_url": "https://usn.ubuntu.com/1253-1/", "reference_id": "USN-1253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1253-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1576" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87560?format=api", "vulnerability_id": "VCID-ydtx-ae9c-eqah", "summary": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18382", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1853", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18292", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18195", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18017", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1044" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65563" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "reference_url": "http://www.securityfocus.com/bid/46488", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46488" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916", "reference_id": "667916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044", "reference_id": "CVE-2011-1044", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1044" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87508?format=api", "vulnerability_id": "VCID-yevh-cfer-dud1", "summary": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/16/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/16/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/16/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/16/4" }, { "reference_url": "http://osvdb.org/70950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70950" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16979", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17245", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17303", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17208", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17153", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17094", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17076", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16886", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0711" }, { "reference_url": "https://patchwork.kernel.org/patch/555461/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.kernel.org/patch/555461/" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log" }, { "reference_url": "http://www.securityfocus.com/bid/46417", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260", "reference_id": "677260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711", "reference_id": "CVE-2011-0711", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0711" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87559?format=api", "vulnerability_id": "VCID-zumd-vknc-87ba", "summary": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21262", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21472", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21304", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21334", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2126", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21127", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21105", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4649" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "reference_url": "http://www.securityfocus.com/bid/46073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46073" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916", "reference_id": "667916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649", "reference_id": "CVE-2010-4649", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4649" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5" }