{"url":"http://public2.vulnerablecode.io/api/packages/127125?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-131.12.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87375?format=json","vulnerability_id":"VCID-58bv-cjnr-3fdh","summary":"kernel: ksm: race between ksmd and exiting task","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2183","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31188","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32178","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=710338","reference_id":"710338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=710338"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35820.c","reference_id":"CVE-2011-2183;OSVDB-74680","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35820.c"},{"reference_url":"https://www.securityfocus.com/bid/48101/info","reference_id":"CVE-2011-2183;OSVDB-74680","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/48101/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1244-1/","reference_id":"USN-1244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1244-1/"},{"reference_url":"https://usn.ubuntu.com/1272-1/","reference_id":"USN-1272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1272-1/"},{"reference_url":"https://usn.ubuntu.com/1278-1/","reference_id":"USN-1278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1278-1/"},{"reference_url":"https://usn.ubuntu.com/1279-1/","reference_id":"USN-1279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1279-1/"},{"reference_url":"https://usn.ubuntu.com/1281-1/","reference_id":"USN-1281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1281-1/"},{"reference_url":"https://usn.ubuntu.com/1285-1/","reference_id":"USN-1285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1285-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2183"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-58bv-cjnr-3fdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87386?format=json","vulnerability_id":"VCID-5mpc-pasz-x3hd","summary":"kernel: nl80211: missing check for valid SSID size in scan operations","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2517","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30237","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2517"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=718152","reference_id":"718152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=718152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1212","reference_id":"RHSA-2011:1212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1813","reference_id":"RHSA-2011:1813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1813"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1244-1/","reference_id":"USN-1244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1244-1/"},{"reference_url":"https://usn.ubuntu.com/1269-1/","reference_id":"USN-1269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1269-1/"},{"reference_url":"https://usn.ubuntu.com/1272-1/","reference_id":"USN-1272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1272-1/"},{"reference_url":"https://usn.ubuntu.com/1274-1/","reference_id":"USN-1274-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1274-1/"},{"reference_url":"https://usn.ubuntu.com/1278-1/","reference_id":"USN-1278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1278-1/"},{"reference_url":"https://usn.ubuntu.com/1279-1/","reference_id":"USN-1279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1279-1/"},{"reference_url":"https://usn.ubuntu.com/1281-1/","reference_id":"USN-1281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1281-1/"},{"reference_url":"https://usn.ubuntu.com/1285-1/","reference_id":"USN-1285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1285-1/"},{"reference_url":"https://usn.ubuntu.com/1286-1/","reference_id":"USN-1286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1286-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2517"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5mpc-pasz-x3hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87392?format=json","vulnerability_id":"VCID-a9mu-gdgc-cbct","summary":"kernel: validate size of EFI GUID partition entries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1776","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18077","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=703026","reference_id":"703026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=703026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1225-1/","reference_id":"USN-1225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1225-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1776"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9mu-gdgc-cbct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87390?format=json","vulnerability_id":"VCID-au4y-xz41-zyfy","summary":"kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2492","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17377","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1732","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17044","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=703019","reference_id":"703019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=703019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1201-1/","reference_id":"USN-1201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1201-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1205-1/","reference_id":"USN-1205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1205-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2492"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au4y-xz41-zyfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87350?format=json","vulnerability_id":"VCID-c551-3re3-xfat","summary":"kernel: bluetooth: buffer overflow in l2cap config request","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2497.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2497","reference_id":"","reference_type":"","scores":[{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86025","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02792","scoring_system":"epss","scoring_elements":"0.86154","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2497"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=716805","reference_id":"716805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=716805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1225-1/","reference_id":"USN-1225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1225-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1239-1/","reference_id":"USN-1239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1239-1/"},{"reference_url":"https://usn.ubuntu.com/1240-1/","reference_id":"USN-1240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1240-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1245-1/","reference_id":"USN-1245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1245-1/"},{"reference_url":"https://usn.ubuntu.com/1246-1/","reference_id":"USN-1246-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1246-1/"},{"reference_url":"https://usn.ubuntu.com/1253-1/","reference_id":"USN-1253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1253-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2497"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c551-3re3-xfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87442?format=json","vulnerability_id":"VCID-dd7k-u8ev-abhz","summary":"kernel signal spoofing issue","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1182","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23362","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1182"},{"reference_url":"https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/03/23/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/03/23/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=690028","reference_id":"690028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=690028"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1182","reference_id":"CVE-2011-1182","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0883","reference_id":"RHSA-2011:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1182"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd7k-u8ev-abhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87421?format=json","vulnerability_id":"VCID-j67y-7adf-3ygp","summary":"kernel: proc: signedness issue in next_pidmap()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8bdc59f215e62098bc5b4256fd9928bf27053a1"},{"reference_url":"http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source","reference_id":"","reference_type":"","scores":[],"url":"http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/19/1"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/20/1"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1593","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12438","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12413","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1593"},{"reference_url":"http://secunia.com/advisories/44164","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44164"},{"reference_url":"http://securitytracker.com/id?1025420","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025420"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66876","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66876"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4"},{"reference_url":"http://www.securityfocus.com/bid/47497","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47497"},{"reference_url":"http://www.ubuntu.com/usn/USN-1146-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1146-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=697822","reference_id":"697822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=697822"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1593","reference_id":"CVE-2011-1593","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1161-1/","reference_id":"USN-1161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1161-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1168-1/","reference_id":"USN-1168-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1168-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1593"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j67y-7adf-3ygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87374?format=json","vulnerability_id":"VCID-krvj-487p-auep","summary":"kernel: ext4: kernel panic when writing data to the last block of sparse file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2695","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.21016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2076","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20497","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=722557","reference_id":"722557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=722557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1386","reference_id":"RHSA-2011:1386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1386"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1239-1/","reference_id":"USN-1239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1239-1/"},{"reference_url":"https://usn.ubuntu.com/1240-1/","reference_id":"USN-1240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1240-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1242-1/","reference_id":"USN-1242-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1242-1/"},{"reference_url":"https://usn.ubuntu.com/1243-1/","reference_id":"USN-1243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1243-1/"},{"reference_url":"https://usn.ubuntu.com/1244-1/","reference_id":"USN-1244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1244-1/"},{"reference_url":"https://usn.ubuntu.com/1245-1/","reference_id":"USN-1245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1245-1/"},{"reference_url":"https://usn.ubuntu.com/1246-1/","reference_id":"USN-1246-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1246-1/"},{"reference_url":"https://usn.ubuntu.com/1253-1/","reference_id":"USN-1253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1253-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2695"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krvj-487p-auep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87376?format=json","vulnerability_id":"VCID-nktq-p6vq-hkgq","summary":"kernel: inet_diag: insufficient validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2213","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19426","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19388","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19279","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2213"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=714536","reference_id":"714536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=714536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1225-1/","reference_id":"USN-1225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1225-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1228-1/","reference_id":"USN-1228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1228-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1246-1/","reference_id":"USN-1246-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1246-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2213"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nktq-p6vq-hkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87380?format=json","vulnerability_id":"VCID-s48v-g94e-jkb9","summary":"kernel: rpc task leak after flock()ing  NFS share","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-1212.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-1212.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2491","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20497","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.21016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2076","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20603","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2491"},{"reference_url":"https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/06/23/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/06/23/6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=709393","reference_id":"709393","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=709393"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2491","reference_id":"CVE-2011-2491","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1212","reference_id":"RHSA-2011:1212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1813","reference_id":"RHSA-2011:1813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1813"},{"reference_url":"https://usn.ubuntu.com/1244-1/","reference_id":"USN-1244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1244-1/"},{"reference_url":"https://usn.ubuntu.com/1268-1/","reference_id":"USN-1268-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1268-1/"},{"reference_url":"https://usn.ubuntu.com/1269-1/","reference_id":"USN-1269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1269-1/"},{"reference_url":"https://usn.ubuntu.com/1271-1/","reference_id":"USN-1271-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1271-1/"},{"reference_url":"https://usn.ubuntu.com/1272-1/","reference_id":"USN-1272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1272-1/"},{"reference_url":"https://usn.ubuntu.com/1274-1/","reference_id":"USN-1274-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1274-1/"},{"reference_url":"https://usn.ubuntu.com/1278-1/","reference_id":"USN-1278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1278-1/"},{"reference_url":"https://usn.ubuntu.com/1279-1/","reference_id":"USN-1279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1279-1/"},{"reference_url":"https://usn.ubuntu.com/1281-1/","reference_id":"USN-1281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1281-1/"},{"reference_url":"https://usn.ubuntu.com/1285-1/","reference_id":"USN-1285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1285-1/"},{"reference_url":"https://usn.ubuntu.com/1286-1/","reference_id":"USN-1286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1286-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2491"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s48v-g94e-jkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3877?format=json","vulnerability_id":"VCID-s74x-nvav-rud6","summary":"VT-d (PCI passthrough) MSI trap injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1898.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1898","reference_id":"","reference_type":"","scores":[{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69881","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69969","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.6994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70033","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70008","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=715555","reference_id":"715555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=715555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1479","reference_id":"RHSA-2011:1479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0358","reference_id":"RHSA-2012:0358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0358"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-3.html","reference_id":"XSA-3","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-3.html"}],"fixed_packages":[],"aliases":["CVE-2011-1898"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s74x-nvav-rud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87405?format=json","vulnerability_id":"VCID-ssru-1x3c-4qch","summary":"kernel: gfs2: make sure fallocate bytes is a multiple of blksize","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2689.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2689","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26577","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26168","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=720861","reference_id":"720861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=720861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1065","reference_id":"RHSA-2011:1065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://usn.ubuntu.com/1211-1/","reference_id":"USN-1211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1211-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2689"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssru-1x3c-4qch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87353?format=json","vulnerability_id":"VCID-st8n-ewcq-tqd8","summary":"kernel: /proc/PID/io infoleak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2495.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2495","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22889","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22535","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22533","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22437","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2495"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=716825","reference_id":"716825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=716825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1212","reference_id":"RHSA-2011:1212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1813","reference_id":"RHSA-2011:1813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1813"},{"reference_url":"https://usn.ubuntu.com/1236-1/","reference_id":"USN-1236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1236-1/"},{"reference_url":"https://usn.ubuntu.com/1239-1/","reference_id":"USN-1239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1239-1/"},{"reference_url":"https://usn.ubuntu.com/1240-1/","reference_id":"USN-1240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1240-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1242-1/","reference_id":"USN-1242-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1242-1/"},{"reference_url":"https://usn.ubuntu.com/1243-1/","reference_id":"USN-1243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1243-1/"},{"reference_url":"https://usn.ubuntu.com/1244-1/","reference_id":"USN-1244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1244-1/"},{"reference_url":"https://usn.ubuntu.com/1245-1/","reference_id":"USN-1245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1245-1/"},{"reference_url":"https://usn.ubuntu.com/1253-1/","reference_id":"USN-1253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1253-1/"},{"reference_url":"https://usn.ubuntu.com/1279-1/","reference_id":"USN-1279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1279-1/"},{"reference_url":"https://usn.ubuntu.com/1281-1/","reference_id":"USN-1281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1281-1/"},{"reference_url":"https://usn.ubuntu.com/1285-1/","reference_id":"USN-1285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1285-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2495"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-st8n-ewcq-tqd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87373?format=json","vulnerability_id":"VCID-wg43-zbfb-nfaq","summary":"kernel: net: Fix memory leak/corruption on VLAN GRO_DROP","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1576","reference_id":"","reference_type":"","scores":[{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73574","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73703","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695173","reference_id":"695173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1106","reference_id":"RHSA-2011:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1189","reference_id":"RHSA-2011:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1219-1/","reference_id":"USN-1219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1219-1/"},{"reference_url":"https://usn.ubuntu.com/1220-1/","reference_id":"USN-1220-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1220-1/"},{"reference_url":"https://usn.ubuntu.com/1227-1/","reference_id":"USN-1227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1227-1/"},{"reference_url":"https://usn.ubuntu.com/1239-1/","reference_id":"USN-1239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1239-1/"},{"reference_url":"https://usn.ubuntu.com/1240-1/","reference_id":"USN-1240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1240-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1245-1/","reference_id":"USN-1245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1245-1/"},{"reference_url":"https://usn.ubuntu.com/1253-1/","reference_id":"USN-1253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1253-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1576"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.12.1%3Farch=el6"}