{"url":"http://public2.vulnerablecode.io/api/packages/127355?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-71.24.1?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-71.24.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87807?format=json","vulnerability_id":"VCID-1n7j-hq91-qqgy","summary":"kernel: sctp: a race between ICMP protocol unreachable and connect()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4526.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4526","reference_id":"","reference_type":"","scores":[{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.8124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81381","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81415","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81472","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81486","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01536","scoring_system":"epss","scoring_elements":"0.81337","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4526"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526"},{"reference_url":"http://secunia.com/advisories/42964","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42964"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64616","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64616"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/01/04/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/01/04/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/01/04/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/01/04/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0163.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0163.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45661"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0169","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0169"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=664914","reference_id":"664914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=664914"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4526","reference_id":"CVE-2010-4526","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0163","reference_id":"RHSA-2011:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4526"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1n7j-hq91-qqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87555?format=json","vulnerability_id":"VCID-2v2h-1vgg-qubq","summary":"kernel: install_special_mapping skips security_file_mmap check","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/09/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/09/12"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/09/13","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/09/13"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/10/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/10/2"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/10/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/10/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4346","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12213","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12349","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12414","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12409","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1806","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18037","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4346"},{"reference_url":"http://secunia.com/advisories/42570","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42570"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://lkml.org/lkml/2010/12/9/222","reference_id":"","reference_type":"","scores":[],"url":"https://lkml.org/lkml/2010/12/9/222"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45323","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45323"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=662189","reference_id":"662189","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=662189"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4346","reference_id":"CVE-2010-4346","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0429","reference_id":"RHSA-2011:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0429"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1105-1/","reference_id":"USN-1105-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1105-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4346"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2h-1vgg-qubq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87675?format=json","vulnerability_id":"VCID-4trp-muyy-ufez","summary":"kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lkml.org/lkml/2010/9/11/170","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/9/11/170"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3296","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26532","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26462","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26587","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26515","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3296"},{"reference_url":"http://secunia.com/advisories/41440","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/41440"},{"reference_url":"http://secunia.com/advisories/42758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42758"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/14/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/14/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/14/7"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43221","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43221"},{"reference_url":"http://www.ubuntu.com/usn/USN-1041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1041-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0070"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=633149","reference_id":"633149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=633149"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3296","reference_id":"CVE-2010-3296","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0771","reference_id":"RHSA-2010:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3296"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4trp-muyy-ufez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87569?format=json","vulnerability_id":"VCID-8zmc-qqfc-m7e1","summary":"kernel: deficiency in processing igmp host membership reports in br_multicast","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0716","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2093","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20962","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20909","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20899","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20773","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20764","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=678169","reference_id":"678169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=678169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://usn.ubuntu.com/1379-1/","reference_id":"USN-1379-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1379-1/"},{"reference_url":"https://usn.ubuntu.com/1387-1/","reference_id":"USN-1387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1387-1/"},{"reference_url":"https://usn.ubuntu.com/1394-1/","reference_id":"USN-1394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1394-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0716"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zmc-qqfc-m7e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87622?format=json","vulnerability_id":"VCID-ccy6-xxzm-vbb4","summary":"kernel: iowarrior usb device heap overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4656","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14881","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14929","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14781","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14645","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14862","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14853","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14898","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4656"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672420","reference_id":"672420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4656"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ccy6-xxzm-vbb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87558?format=json","vulnerability_id":"VCID-dg9k-nfvc-k7en","summary":"kernel: orinoco: fix TKIP countermeasure behaviour","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4648","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45375","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45458","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45402","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45426","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667907","reference_id":"667907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4648"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dg9k-nfvc-k7en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87500?format=json","vulnerability_id":"VCID-gwyq-wkdy-5fba","summary":"kernel: s390 task_show_regs infoleak","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/16/9"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0710.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0710","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29031","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28549","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28631","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28554","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0710"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65464","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65464"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110216.bz2"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46421","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46421"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=677850","reference_id":"677850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=677850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0710","reference_id":"CVE-2011-0710","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0429","reference_id":"RHSA-2011:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0429"}],"fixed_packages":[],"aliases":["CVE-2011-0710"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwyq-wkdy-5fba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87521?format=json","vulnerability_id":"VCID-h9a4-7v2b-9kg2","summary":"kernel: gro: reset dev and skb_iff on skb reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1478","reference_id":"","reference_type":"","scores":[{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75759","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75843","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.7589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75939","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75947","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75961","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=691270","reference_id":"691270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=691270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0429","reference_id":"RHSA-2011:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1253","reference_id":"RHSA-2011:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1253"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1256-1/","reference_id":"USN-1256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1256-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1478"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9a4-7v2b-9kg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87586?format=json","vulnerability_id":"VCID-ku5j-hkct-aug2","summary":"kernel: panic in ib_cm:cm_work_handler","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2011-0927.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0695","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63391","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63351","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63364","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0695"},{"reference_url":"http://secunia.com/advisories/43693","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43693"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66056","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66056"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/03/11/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/03/11/1"},{"reference_url":"http://www.securityfocus.com/bid/46839","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46839"},{"reference_url":"http://www.spinics.net/lists/linux-rdma/msg07447.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/linux-rdma/msg07447.html"},{"reference_url":"http://www.spinics.net/lists/linux-rdma/msg07448.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/linux-rdma/msg07448.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1146-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1146-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=653648","reference_id":"653648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=653648"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0695","reference_id":"CVE-2011-0695","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0500","reference_id":"RHSA-2011:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0927","reference_id":"RHSA-2011:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0927"},{"reference_url":"https://usn.ubuntu.com/1111-1/","reference_id":"USN-1111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1111-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1159-1/","reference_id":"USN-1159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1159-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1162-1/","reference_id":"USN-1162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1162-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0695"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87526?format=json","vulnerability_id":"VCID-uxye-sz24-dqd4","summary":"kernel: av7110 negative array offset","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644"},{"reference_url":"http://openwall.com/lists/oss-security/2011/01/24/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/01/24/2"},{"reference_url":"http://openwall.com/lists/oss-security/2011/01/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/01/25/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0521","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17117","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17202","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1737","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17136","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17016","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1711","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17081","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0521"},{"reference_url":"http://secunia.com/advisories/43009","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43009"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64988","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64988"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45986","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45986"},{"reference_url":"http://www.securitytracker.com/id?1025195","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025195"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672398","reference_id":"672398","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672398"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0521","reference_id":"CVE-2011-0521","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0263","reference_id":"RHSA-2011:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0429","reference_id":"RHSA-2011:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0429"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1111-1/","reference_id":"USN-1111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1111-1/"},{"reference_url":"https://usn.ubuntu.com/1133-1/","reference_id":"USN-1133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1133-1/"},{"reference_url":"https://usn.ubuntu.com/1141-1/","reference_id":"USN-1141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1141-1/"},{"reference_url":"https://usn.ubuntu.com/1160-1/","reference_id":"USN-1160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1160-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2011-0521"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxye-sz24-dqd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87634?format=json","vulnerability_id":"VCID-xr4s-smmp-fubc","summary":"kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4655","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16379","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16498","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16603","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16569","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4655"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672428","reference_id":"672428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0263","reference_id":"RHSA-2011:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0303","reference_id":"RHSA-2011:0303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0330","reference_id":"RHSA-2011:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0421","reference_id":"RHSA-2011:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0421"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1146-1/","reference_id":"USN-1146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1146-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4655"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4s-smmp-fubc"}],"fixing_vulnerabilities":[],"risk_score":"3.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.24.1%3Farch=el6"}