{"url":"http://public2.vulnerablecode.io/api/packages/127675?format=json","purl":"pkg:rpm/redhat/kernel@2.4.21-66?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.4.21-66","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87660?format=json","vulnerability_id":"VCID-3vwf-bjs1-6bg9","summary":"kernel: 64-bit Compatibility Mode Stack Pointer Underflow","references":[{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html"},{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html"},{"reference_url":"http://blog.ksplice.com/2010/09/cve-2010-3081/","reference_id":"","reference_type":"","scores":[],"url":"http://blog.ksplice.com/2010/09/cve-2010-3081/"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6"},{"reference_url":"http://isc.sans.edu/diary.html?storyid=9574","reference_id":"","reference_type":"","scores":[],"url":"http://isc.sans.edu/diary.html?storyid=9574"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128461522230211&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128461522230211&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3081.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3081.json"},{"reference_url":"https://access.redhat.com/kb/docs/DOC-40265","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/kb/docs/DOC-40265"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3081","reference_id":"","reference_type":"","scores":[{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91649","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91652","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07253","scoring_system":"epss","scoring_elements":"0.91654","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3081"},{"reference_url":"http://secunia.com/advisories/42384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42384"},{"reference_url":"http://secunia.com/advisories/43315","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43315"},{"reference_url":"http://sota.gen.nz/compat1/","reference_id":"","reference_type":"","scores":[],"url":"http://sota.gen.nz/compat1/"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:214","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:214"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:247","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:247"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0758.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0758.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0882.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0882.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514938/30/30/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514938/30/30/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/516397/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516397/100/0/threaded"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2010-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2010-0017.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3083"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3117","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3117"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=634457","reference_id":"634457","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=634457"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3081","reference_id":"CVE-2010-3081","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3081"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15024.c","reference_id":"CVE-2010-3081;OSVDB-68213","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15024.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0704","reference_id":"RHSA-2010:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0705","reference_id":"RHSA-2010:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0711","reference_id":"RHSA-2010:0711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0718","reference_id":"RHSA-2010:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0719","reference_id":"RHSA-2010:0719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0758","reference_id":"RHSA-2010:0758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0842","reference_id":"RHSA-2010:0842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"},{"reference_url":"https://usn.ubuntu.com/988-1/","reference_id":"USN-988-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/988-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3081"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vwf-bjs1-6bg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88073?format=json","vulnerability_id":"VCID-9bng-92hg-yygp","summary":"kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597","reference_id":"529597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3620"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bng-92hg-yygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87944?format=json","vulnerability_id":"VCID-be19-1hme-s7aq","summary":"kernel: e1000 issue reported at 26c3","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4536.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4536","reference_id":"","reference_type":"","scores":[{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.8165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01586","scoring_system":"epss","scoring_elements":"0.81687","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4536"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=552126","reference_id":"552126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=552126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0019","reference_id":"RHSA-2010:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0020","reference_id":"RHSA-2010:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0041","reference_id":"RHSA-2010:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0053","reference_id":"RHSA-2010:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0079","reference_id":"RHSA-2010:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0095","reference_id":"RHSA-2010:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0111","reference_id":"RHSA-2010:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/894-1/","reference_id":"USN-894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/894-1/"}],"fixed_packages":[],"aliases":["CVE-2009-4536"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-be19-1hme-s7aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87986?format=json","vulnerability_id":"VCID-djq9-mejy-b7ah","summary":"kernel: gdth: Prevent negative offsets in ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3080.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3080","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21533","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21372","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3080"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=539414","reference_id":"539414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=539414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0041","reference_id":"RHSA-2010:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0076","reference_id":"RHSA-2010:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3080"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-djq9-mejy-b7ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88773?format=json","vulnerability_id":"VCID-gumm-ayru-3qcd","summary":"kernel: ipv6: skb is unexpectedly freed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1188.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1188","reference_id":"","reference_type":"","scores":[{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1188"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=577711","reference_id":"577711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=577711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0178","reference_id":"RHSA-2010:0178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0380","reference_id":"RHSA-2010:0380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0424","reference_id":"RHSA-2010:0424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0439","reference_id":"RHSA-2010:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/947-1/","reference_id":"USN-947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/947-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1188"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gumm-ayru-3qcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87705?format=json","vulnerability_id":"VCID-nadw-stt8-53b3","summary":"kernel: mm: keep a guard page below a grow-down stack segment","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=320b2b8de12698082609ebbc1a17165727f4c893","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=320b2b8de12698082609ebbc1a17165727f4c893"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2240.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2240","reference_id":"","reference_type":"","scores":[{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.32944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33193","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33019","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2240"},{"reference_url":"http://securitytracker.com/id?1024344","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024344"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13247","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13247"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0661.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0661.html"},{"reference_url":"http://www.debian.org/security/2010/dsa-2094","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2094"},{"reference_url":"http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.52","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.52"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.19","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.19"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.4","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.4"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.2"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:172","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0660.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0660.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0670.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0670.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0882.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0882.html"},{"reference_url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0009.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=606611","reference_id":"606611","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=606611"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2240","reference_id":"CVE-2010-2240","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0631","reference_id":"RHSA-2010:0631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0660","reference_id":"RHSA-2010:0660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0661","reference_id":"RHSA-2010:0661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0670","reference_id":"RHSA-2010:0670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0676","reference_id":"RHSA-2010:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0677","reference_id":"RHSA-2010:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/974-1/","reference_id":"USN-974-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/974-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2240"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nadw-stt8-53b3"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-66%3Farch=EL"}