{"url":"http://public2.vulnerablecode.io/api/packages/127285?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-71.29.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87810?format=json","vulnerability_id":"VCID-1rgx-tmw4-uqgt","summary":"kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1573","reference_id":"","reference_type":"","scores":[{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73147","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.7317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.7325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73281","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73305","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73264","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00751","scoring_system":"epss","scoring_elements":"0.73288","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695383","reference_id":"695383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1236-1/","reference_id":"USN-1236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1236-1/"},{"reference_url":"https://usn.ubuntu.com/1241-1/","reference_id":"USN-1241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1241-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1573"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgx-tmw4-uqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87538?format=json","vulnerability_id":"VCID-6b25-pj7t-6ygv","summary":"kernel: ima: fix add LSM rule bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0006.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0006","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22625","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22693","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22488","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22376","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22539","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22507","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22523","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667912","reference_id":"667912","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0006"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6b25-pj7t-6ygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87506?format=json","vulnerability_id":"VCID-75ba-49cu-zuaj","summary":"kernel: ebtables stack infoleak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1080","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22889","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31579","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31219","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31287","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31294","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31226","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1080"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=681262","reference_id":"681262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=681262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0833","reference_id":"RHSA-2011:0833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0833"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1080"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75ba-49cu-zuaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87502?format=json","vulnerability_id":"VCID-88gf-yp5g-kyg4","summary":"kernel: ALSA: caiaq - Fix possible string-buffer overflow","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0712","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17507","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17438","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17419","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17387","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0712"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65461","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65461"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/02/16/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/02/16/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/02/16/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/02/16/12"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/02/16/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/02/16/5"},{"reference_url":"http://www.securityfocus.com/bid/46419","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46419"},{"reference_url":"http://www.ubuntu.com/usn/USN-1146-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1146-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=677881","reference_id":"677881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=677881"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0712","reference_id":"CVE-2011-0712","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0712"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88gf-yp5g-kyg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87456?format=json","vulnerability_id":"VCID-b5ab-aade-4kfw","summary":"kernel: proc: protect mm start_code/end_code in /proc/pid/stat","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0726","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22414","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22524","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2247","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22482","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22157","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22241","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22321","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22289","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22307","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=684569","reference_id":"684569","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=684569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0833","reference_id":"RHSA-2011:0833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0833"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0726"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ab-aade-4kfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87492?format=json","vulnerability_id":"VCID-gyye-vwnb-6qeg","summary":"kernel: drm_modeset_ctl signedness issue","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1922756124ddd53846877416d92ba4a802bc658f"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1013","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26305","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26656","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2653","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26303","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26289","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1013"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/67199","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/67199"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/sys/dev/pci/drm/drm_irq.c.diff?r1=1.41%3Br2=1.42%3Bf=h"},{"reference_url":"http://www.securityfocus.com/bid/47639","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47639"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=679925","reference_id":"679925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=679925"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1013","reference_id":"CVE-2011-1013","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1013"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gyye-vwnb-6qeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87579?format=json","vulnerability_id":"VCID-k9ct-x12b-cfd6","summary":"kernel: inotify memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4250","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28003","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27922","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27787","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27601","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27427","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27488","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27432","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27448","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=656830","reference_id":"656830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=656830"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c","reference_id":"CVE-2010-4250;OSVDB-74644","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c"},{"reference_url":"https://www.securityfocus.com/bid/45036/info","reference_id":"CVE-2010-4250;OSVDB-74644","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/45036/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4250"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9ct-x12b-cfd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87483?format=json","vulnerability_id":"VCID-paxh-r3cd-cfdu","summary":"kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN","references":[{"reference_url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8909c9ad8ff03611c9c96c9a92656213e4bb495b"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1019.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1019","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22783","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22894","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23064","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23007","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22967","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22924","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22643","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22803","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22768","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1019"},{"reference_url":"https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/8909c9ad8ff03611c9c96c9a92656213e4bb495b"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/02/25/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/02/25/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=680360","reference_id":"680360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=680360"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1019","reference_id":"CVE-2011-1019","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1019"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-paxh-r3cd-cfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87613?format=json","vulnerability_id":"VCID-qraj-ye4g-8qdr","summary":"kernel: CAN info leak","references":[{"reference_url":"http://openwall.com/lists/oss-security/2010/11/03/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/03/3"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/04/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/04/4"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/20/2"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/21/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/21/1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4565","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25323","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25571","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25256","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25324","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25386","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25306","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4565"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.securityfocus.com/bid/44661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44661"},{"reference_url":"http://www.spinics.net/lists/netdev/msg145791.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg145791.html"},{"reference_url":"http://www.spinics.net/lists/netdev/msg145796.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg145796.html"},{"reference_url":"http://www.spinics.net/lists/netdev/msg146270.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg146270.html"},{"reference_url":"http://www.spinics.net/lists/netdev/msg146468.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg146468.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=664544","reference_id":"664544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=664544"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4565","reference_id":"CVE-2010-4565","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4565"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qraj-ye4g-8qdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87505?format=json","vulnerability_id":"VCID-rh8x-5dz8-tbd6","summary":"kernel: bnep device field missing NULL terminator","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1079","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18679","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18498","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18685","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30114","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30069","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30036","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=681260","reference_id":"681260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=681260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0833","reference_id":"RHSA-2011:0833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0833"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1212-1/","reference_id":"USN-1212-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1212-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1079"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rh8x-5dz8-tbd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87503?format=json","vulnerability_id":"VCID-sm7b-9u6f-8bar","summary":"kernel: drm/radeon/kms: check AA resolve registers on r300","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/24/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/24/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/24/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/24/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/25/4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1016.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1016","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16344","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16404","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16156","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16273","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1638","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1016"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65691","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65691"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5"},{"reference_url":"http://www.securityfocus.com/bid/46557","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46557"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=680000","reference_id":"680000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=680000"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1016","reference_id":"CVE-2011-1016","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1016"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sm7b-9u6f-8bar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87560?format=json","vulnerability_id":"VCID-ydtx-ae9c-eqah","summary":"kernel: IB/uverbs: Handle large number of entries in poll CQ","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1044","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18205","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18176","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1044"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65563","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65563"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"},{"reference_url":"http://www.securityfocus.com/bid/46488","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46488"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916","reference_id":"667916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1044","reference_id":"CVE-2011-1044","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1044"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87508?format=json","vulnerability_id":"VCID-yevh-cfer-dud1","summary":"kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/4"},{"reference_url":"http://osvdb.org/70950","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/70950"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0711","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1708","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17162","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17327","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17245","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17303","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17073","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17044","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0711"},{"reference_url":"https://patchwork.kernel.org/patch/555461/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.kernel.org/patch/555461/"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log"},{"reference_url":"http://www.securityfocus.com/bid/46417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=677260","reference_id":"677260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=677260"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0711","reference_id":"CVE-2011-0711","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0711"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yevh-cfer-dud1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87478?format=json","vulnerability_id":"VCID-zedv-xfpx-effg","summary":"kernel: dccp: fix oops on Reset after close","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1093","reference_id":"","reference_type":"","scores":[{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79059","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79083","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.7922","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79238","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1093"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=682954","reference_id":"682954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=682954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0833","reference_id":"RHSA-2011:0833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0833"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1167-1/","reference_id":"USN-1167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1167-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1189-1/","reference_id":"USN-1189-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1189-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1093"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zedv-xfpx-effg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87559?format=json","vulnerability_id":"VCID-zumd-vknc-87ba","summary":"kernel: IB/uverbs: Handle large number of entries in poll CQ","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4649","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21155","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21262","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21418","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21334","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21135","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4649"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37"},{"reference_url":"http://www.securityfocus.com/bid/46073","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916","reference_id":"667916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4649","reference_id":"CVE-2010-4649","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0498","reference_id":"RHSA-2011:0498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4649"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba"}],"fixing_vulnerabilities":[],"risk_score":"3.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.29.1%3Farch=el6"}