{"url":"http://public2.vulnerablecode.io/api/packages/127107?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-238.19.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87810?format=json","vulnerability_id":"VCID-1rgx-tmw4-uqgt","summary":"kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1573","reference_id":"","reference_type":"","scores":[{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73147","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.7317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.7325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73281","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73305","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73264","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73288","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695383","reference_id":"695383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1236-1/","reference_id":"USN-1236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1236-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1573"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgx-tmw4-uqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87415?format=json","vulnerability_id":"VCID-4gcp-bfru-57ay","summary":"kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/21/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/21/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/22/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/22/7"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2022","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1318","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13266","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13141","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13046","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13119","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12925","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13159","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13151","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2022"},{"reference_url":"https://lkml.org/lkml/2011/4/14/293","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/4/14/293"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5"},{"reference_url":"http://www.securityfocus.com/bid/47843","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47843"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=698996","reference_id":"698996","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=698996"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2022","reference_id":"CVE-2011-2022","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1350","reference_id":"RHSA-2011:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1350"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2022"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gcp-bfru-57ay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87341?format=json","vulnerability_id":"VCID-8nyx-mdyc-t3ez","summary":"kernel: xen: vmx: insecure cpuid vmexit","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1936","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24421","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24429","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24444","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24393","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24365","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24239","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24186","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2407","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24151","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24216","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24162","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24179","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1936"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=706323","reference_id":"706323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=706323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"}],"fixed_packages":[],"aliases":["CVE-2011-1936"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyx-mdyc-t3ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87392?format=json","vulnerability_id":"VCID-a9mu-gdgc-cbct","summary":"kernel: validate size of EFI GUID partition entries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1776","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18077","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18166","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18266","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18232","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18259","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=703026","reference_id":"703026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=703026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1225-1/","reference_id":"USN-1225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1225-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1776"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9mu-gdgc-cbct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87390?format=json","vulnerability_id":"VCID-au4y-xz41-zyfy","summary":"kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2492","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17377","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1732","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17044","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17225","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17194","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17233","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=703019","reference_id":"703019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=703019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1201-1/","reference_id":"USN-1201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1201-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1205-1/","reference_id":"USN-1205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1205-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2492"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au4y-xz41-zyfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87442?format=json","vulnerability_id":"VCID-dd7k-u8ev-abhz","summary":"kernel signal spoofing issue","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1182","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23365","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23362","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23386","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23349","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1182"},{"reference_url":"https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/03/23/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/03/23/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=690028","reference_id":"690028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=690028"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1182","reference_id":"CVE-2011-1182","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0883","reference_id":"RHSA-2011:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1182"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd7k-u8ev-abhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87414?format=json","vulnerability_id":"VCID-dx7m-ma2j-6ket","summary":"kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/21/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/21/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/22/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/22/7"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1745","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1318","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13266","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13141","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13046","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13119","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12925","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13159","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13151","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1745"},{"reference_url":"https://lkml.org/lkml/2011/4/14/293","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/4/14/293"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5"},{"reference_url":"http://www.securityfocus.com/bid/47534","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47534"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=698996","reference_id":"698996","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=698996"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1745","reference_id":"CVE-2011-1745","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1350","reference_id":"RHSA-2011:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1350"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1745"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dx7m-ma2j-6ket"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87416?format=json","vulnerability_id":"VCID-fhyj-cymx-pfgp","summary":"kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/21/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/21/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/22/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/22/7"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1746","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12223","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12237","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12199","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12022","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12217","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1746"},{"reference_url":"https://lkml.org/lkml/2011/4/14/294","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/4/14/294"},{"reference_url":"https://lkml.org/lkml/2011/4/19/400","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2011/4/19/400"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5"},{"reference_url":"http://www.securityfocus.com/bid/47535","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47535"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=698998","reference_id":"698998","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=698998"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1746","reference_id":"CVE-2011-1746","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1350","reference_id":"RHSA-2011:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1350"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1183-1/","reference_id":"USN-1183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1183-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1746"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhyj-cymx-pfgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87421?format=json","vulnerability_id":"VCID-j67y-7adf-3ygp","summary":"kernel: proc: signedness issue in next_pidmap()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1"},{"reference_url":"http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source","reference_id":"","reference_type":"","scores":[],"url":"http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/19/1"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/20/1"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1593","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12438","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12466","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12521","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1593"},{"reference_url":"http://secunia.com/advisories/44164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44164"},{"reference_url":"http://securitytracker.com/id?1025420","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025420"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66876","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66876"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4"},{"reference_url":"http://www.securityfocus.com/bid/47497","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47497"},{"reference_url":"http://www.ubuntu.com/usn/USN-1146-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1146-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=697822","reference_id":"697822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=697822"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1593","reference_id":"CVE-2011-1593","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1593"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j67y-7adf-3ygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87586?format=json","vulnerability_id":"VCID-ku5j-hkct-aug2","summary":"kernel: panic in ib_cm:cm_work_handler","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0695","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63391","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63351","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63364","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0695"},{"reference_url":"http://secunia.com/advisories/43693","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43693"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66056","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66056"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/03/11/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/03/11/1"},{"reference_url":"http://www.securityfocus.com/bid/46839","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46839"},{"reference_url":"http://www.spinics.net/lists/linux-rdma/msg07447.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/linux-rdma/msg07447.html"},{"reference_url":"http://www.spinics.net/lists/linux-rdma/msg07448.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/linux-rdma/msg07448.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1146-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1146-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=653648","reference_id":"653648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=653648"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0695","reference_id":"CVE-2011-0695","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1111-1/","reference_id":"USN-1111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1111-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0695"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87376?format=json","vulnerability_id":"VCID-nktq-p6vq-hkgq","summary":"kernel: inet_diag: insufficient validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2213","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19426","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19388","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19279","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19416","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19446","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2213"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=714536","reference_id":"714536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=714536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1225-1/","reference_id":"USN-1225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1225-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1246-1/","reference_id":"USN-1246-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1246-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2213"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nktq-p6vq-hkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87373?format=json","vulnerability_id":"VCID-wg43-zbfb-nfaq","summary":"kernel: net: Fix memory leak/corruption on VLAN GRO_DROP","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1576","reference_id":"","reference_type":"","scores":[{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73574","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73703","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73728","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73752","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73715","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73737","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695173","reference_id":"695173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1106","reference_id":"RHSA-2011:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1239-1/","reference_id":"USN-1239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1239-1/"},{"reference_url":"https://usn.ubuntu.com/1240-1/","reference_id":"USN-1240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1240-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1245-1/","reference_id":"USN-1245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1245-1/"},{"reference_url":"https://usn.ubuntu.com/1253-1/","reference_id":"USN-1253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1253-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1576"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87560?format=json","vulnerability_id":"VCID-ydtx-ae9c-eqah","summary":"kernel: IB/uverbs: Handle large number of entries in poll CQ","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1044","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18205","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18176","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1044"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65563","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65563"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"},{"reference_url":"http://www.securityfocus.com/bid/46488","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46488"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916","reference_id":"667916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1044","reference_id":"CVE-2011-1044","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1044"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87508?format=json","vulnerability_id":"VCID-yevh-cfer-dud1","summary":"kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/4"},{"reference_url":"http://osvdb.org/70950","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/70950"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0711","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1708","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17162","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17327","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17245","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17303","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17073","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17044","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0711"},{"reference_url":"https://patchwork.kernel.org/patch/555461/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.kernel.org/patch/555461/"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log"},{"reference_url":"http://www.securityfocus.com/bid/46417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=677260","reference_id":"677260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=677260"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0711","reference_id":"CVE-2011-0711","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0711"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87559?format=json","vulnerability_id":"VCID-zumd-vknc-87ba","summary":"kernel: IB/uverbs: Handle large number of entries in poll CQ","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4649","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21155","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21262","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21334","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21135","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4649"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"},{"reference_url":"http://www.securityfocus.com/bid/46073","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916","reference_id":"667916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4649","reference_id":"CVE-2010-4649","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4649"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5"}