Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127285?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127285?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-71.29.1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87810?format=api", "vulnerability_id": "VCID-1rgx-tmw4-uqgt", "summary": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.7317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.7325", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73261", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73255", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00751", "scoring_system": "epss", "scoring_elements": "0.73281", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1573" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383", "reference_id": "695383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1236-1/", "reference_id": "USN-1236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1236-1/" }, { "reference_url": "https://usn.ubuntu.com/1241-1/", "reference_id": "USN-1241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1241-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1573" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgx-tmw4-uqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87538?format=api", "vulnerability_id": "VCID-6b25-pj7t-6ygv", "summary": "kernel: ima: fix add LSM rule bug", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0006.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0006.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22625", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22695", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22693", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22644", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22488", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22479", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22477", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22376", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22462", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0006" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=667912", "reference_id": "667912", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1394-1/", "reference_id": "USN-1394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1394-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0006" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6b25-pj7t-6ygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87506?format=api", "vulnerability_id": "VCID-75ba-49cu-zuaj", "summary": "kernel: ebtables stack infoleak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1080", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22844", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22889", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22752", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31777", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31747", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31579", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31368", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31219", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31287", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1080" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262", "reference_id": "681262", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0833", "reference_id": "RHSA-2011:0833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0833" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1189-1/", "reference_id": "USN-1189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1189-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1080" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75ba-49cu-zuaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87502?format=api", "vulnerability_id": "VCID-88gf-yp5g-kyg4", "summary": "kernel: ALSA: caiaq - Fix possible string-buffer overflow", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17322", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17766", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17493", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17643", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17562", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17507", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17516", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1755", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1746", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17438", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17369", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17231", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0712" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65461" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/16/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/16/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/16/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/16/12" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/16/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/16/5" }, { "reference_url": "http://www.securityfocus.com/bid/46419", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46419" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1146-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1146-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=677881", "reference_id": "677881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677881" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0712", "reference_id": "CVE-2011-0712", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0712" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1146-1/", "reference_id": "USN-1146-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1146-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0712" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88gf-yp5g-kyg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87456?format=api", "vulnerability_id": "VCID-b5ab-aade-4kfw", "summary": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22414", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22411", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22492", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22566", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22524", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22482", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22278", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22264", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22259", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22157", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22241", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0726" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569", "reference_id": "684569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0833", "reference_id": "RHSA-2011:0833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0833" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1170-1/", "reference_id": "USN-1170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1170-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0726" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ab-aade-4kfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87492?format=api", "vulnerability_id": "VCID-gyye-vwnb-6qeg", "summary": "kernel: drm_modeset_ctl signedness issue", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26303", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26656", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26703", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26598", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26608", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26424", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26366", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26234", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1013" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67199" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" }, { "reference_url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c" }, { "reference_url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h" }, { "reference_url": "http://www.securityfocus.com/bid/47639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47639" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=679925", "reference_id": "679925", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679925" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1013", "reference_id": "CVE-2011-1013", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1013" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyye-vwnb-6qeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87579?format=api", "vulnerability_id": "VCID-k9ct-x12b-cfd6", "summary": "kernel: inotify memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4250", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28003", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27912", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2798", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27922", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27872", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27787", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27601", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27427", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27488", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4250" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830", "reference_id": "656830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c", "reference_id": "CVE-2010-4250;OSVDB-74644", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c" }, { "reference_url": "https://www.securityfocus.com/bid/45036/info", "reference_id": "CVE-2010-4250;OSVDB-74644", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/45036/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1394-1/", "reference_id": "USN-1394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1394-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4250" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9ct-x12b-cfd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87483?format=api", "vulnerability_id": "VCID-paxh-r3cd-cfdu", "summary": "kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN", "references": [ { "reference_url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1019", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23064", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23007", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22967", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22924", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22755", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22749", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22743", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22643", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1019" }, { "reference_url": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/25/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/25/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360", "reference_id": "680360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1019", "reference_id": "CVE-2011-1019", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1019" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-paxh-r3cd-cfdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87613?format=api", "vulnerability_id": "VCID-qraj-ye4g-8qdr", "summary": "kernel: CAN info leak", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2010/11/03/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/03/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/04/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/04/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/12/20/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/12/20/2" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/12/21/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/12/21/1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25324", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25672", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25613", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25571", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25515", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2552", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25504", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25431", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25423", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25375", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25256", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4565" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { "reference_url": "http://www.securityfocus.com/bid/44661", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44661" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145791.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145791.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145796.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145796.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg146270.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg146270.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg146468.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg146468.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544", "reference_id": "664544", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565", "reference_id": "CVE-2010-4565", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4565" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qraj-ye4g-8qdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87505?format=api", "vulnerability_id": "VCID-rh8x-5dz8-tbd6", "summary": "kernel: bnep device field missing NULL terminator", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1079", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18689", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18668", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18498", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18583", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30036", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3002", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30199", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30108", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30112", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1079" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260", "reference_id": "681260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0833", "reference_id": "RHSA-2011:0833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0833" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1189-1/", "reference_id": "USN-1189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1189-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1212-1/", "reference_id": "USN-1212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1212-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1079" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rh8x-5dz8-tbd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87503?format=api", "vulnerability_id": "VCID-sm7b-9u6f-8bar", "summary": "kernel: drm/radeon/kms: check AA resolve registers on r300", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/24/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/24/11" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/24/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/24/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/25/4" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1016.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1016.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1016", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16273", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16378", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16541", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16503", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16385", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16404", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16441", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16334", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16332", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16288", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16156", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1016" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65691" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5" }, { "reference_url": "http://www.securityfocus.com/bid/46557", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46557" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=680000", "reference_id": "680000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680000" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1016", "reference_id": "CVE-2011-1016", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1016" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm7b-9u6f-8bar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87560?format=api", "vulnerability_id": "VCID-ydtx-ae9c-eqah", "summary": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18382", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1853", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18292", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18195", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18017", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1044" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65563" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "reference_url": "http://www.securityfocus.com/bid/46488", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46488" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916", "reference_id": "667916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044", "reference_id": "CVE-2011-1044", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1044" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87508?format=api", "vulnerability_id": "VCID-yevh-cfer-dud1", "summary": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/16/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/16/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/16/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/16/4" }, { "reference_url": "http://osvdb.org/70950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70950" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16979", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17245", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17303", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17208", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17153", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17094", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17076", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16886", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0711" }, { "reference_url": "https://patchwork.kernel.org/patch/555461/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.kernel.org/patch/555461/" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log" }, { "reference_url": "http://www.securityfocus.com/bid/46417", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260", "reference_id": "677260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711", "reference_id": "CVE-2011-0711", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1159-1/", "reference_id": "USN-1159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1159-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1162-1/", "reference_id": "USN-1162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1162-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0711" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87478?format=api", "vulnerability_id": "VCID-zedv-xfpx-effg", "summary": "kernel: dccp: fix oops on Reset after close", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1093", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79048", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79059", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79083", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79115", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79101", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79092", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79119", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79155", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79171", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01222", "scoring_system": "epss", "scoring_elements": "0.79205", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1093" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954", "reference_id": "682954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0500", "reference_id": "RHSA-2011:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0833", "reference_id": "RHSA-2011:0833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0833" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1141-1/", "reference_id": "USN-1141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1141-1/" }, { "reference_url": "https://usn.ubuntu.com/1160-1/", "reference_id": "USN-1160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1160-1/" }, { "reference_url": "https://usn.ubuntu.com/1167-1/", "reference_id": "USN-1167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1167-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1189-1/", "reference_id": "USN-1189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1189-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" }, { "reference_url": "https://usn.ubuntu.com/1256-1/", "reference_id": "USN-1256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1093" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zedv-xfpx-effg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87559?format=api", "vulnerability_id": "VCID-zumd-vknc-87ba", "summary": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-0927.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21262", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21472", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21304", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21334", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2126", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21127", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21105", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4649" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "reference_url": "http://www.securityfocus.com/bid/46073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46073" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916", "reference_id": "667916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649", "reference_id": "CVE-2010-4649", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0498", "reference_id": "RHSA-2011:0498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0927", "reference_id": "RHSA-2011:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0927" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4649" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.29.1%3Farch=el6" }