{"url":"http://public2.vulnerablecode.io/api/packages/128036?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-164.11.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-164.11.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87950?format=json","vulnerability_id":"VCID-6maj-yfz2-p7h3","summary":"kernel: create_elf_tables can leave urandom in a bad state","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4141.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4141","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30388","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30433","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30358","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4141"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=547906","reference_id":"547906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=547906"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/33523.c","reference_id":"CVE-2009-4141;OSVDB-61687","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/33523.c"},{"reference_url":"https://www.securityfocus.com/bid/37806/info","reference_id":"CVE-2009-4141;OSVDB-61687","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/37806/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0149","reference_id":"RHSA-2010:0149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0161","reference_id":"RHSA-2010:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0161"},{"reference_url":"https://usn.ubuntu.com/894-1/","reference_id":"USN-894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/894-1/"}],"fixed_packages":[],"aliases":["CVE-2009-4141"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6maj-yfz2-p7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88044?format=json","vulnerability_id":"VCID-7xqe-cvcu-cqeu","summary":"kernel: megaraid_sas permissions in sysfs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3889.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3889","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25653","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25624","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25567","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25424","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3889"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526068","reference_id":"526068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1635","reference_id":"RHSA-2009:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0076","reference_id":"RHSA-2010:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0076"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3889"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xqe-cvcu-cqeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87953?format=json","vulnerability_id":"VCID-bzck-use4-7ygm","summary":"kernel: firewire: ohci: handle receive packets with a data length of zero","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4138","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23829","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23563","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4138"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=547236","reference_id":"547236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=547236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0631","reference_id":"RHSA-2010:0631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0631"},{"reference_url":"https://usn.ubuntu.com/894-1/","reference_id":"USN-894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/894-1/"}],"fixed_packages":[],"aliases":["CVE-2009-4138"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bzck-use4-7ygm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88040?format=json","vulnerability_id":"VCID-c7vw-3qbq-wubw","summary":"kernel: x86_64 32 bit process register leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2910.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2910.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2910","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16313","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16093","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2910"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526788","reference_id":"526788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2910"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c7vw-3qbq-wubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87919?format=json","vulnerability_id":"VCID-d3sv-sfxz-jyg8","summary":"kernel: qla2xxx NPIV vport management pseudofiles are world writable","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3556.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3556","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07221","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07412","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07385","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3556"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=537177","reference_id":"537177","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=537177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"}],"fixed_packages":[],"aliases":["CVE-2009-3556"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3sv-sfxz-jyg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87986?format=json","vulnerability_id":"VCID-djq9-mejy-b7ah","summary":"kernel: gdth: Prevent negative offsets in ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3080.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3080","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21533","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21372","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3080"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=539414","reference_id":"539414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=539414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0041","reference_id":"RHSA-2010:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0076","reference_id":"RHSA-2010:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3080"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-djq9-mejy-b7ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87920?format=json","vulnerability_id":"VCID-fcjb-4n2a-auh4","summary":"kernel: emergency route cache flushing leads to node deadlock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4272.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4272","reference_id":"","reference_type":"","scores":[{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82764","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.8278","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82794","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.8279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82829","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.8287","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0181","scoring_system":"epss","scoring_elements":"0.82905","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4272"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=545411","reference_id":"545411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=545411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0095","reference_id":"RHSA-2010:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0095"}],"fixed_packages":[],"aliases":["CVE-2009-4272"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcjb-4n2a-auh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87992?format=json","vulnerability_id":"VCID-h61x-6rtm-w7b3","summary":"kernel: use flag in do_coredump()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6304.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6304","reference_id":"","reference_type":"","scores":[{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80476","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80341","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80421","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80452","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80458","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6304"},{"reference_url":"http://secunia.com/advisories/23349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23349"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10797","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10797"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7446","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7446"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0046.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0046.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0095.html"},{"reference_url":"http://support.avaya.com/css/P8/documents/100073666","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100073666"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19.1"},{"reference_url":"http://www.securityfocus.com/bid/21591","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21591"},{"reference_url":"http://www.trustix.org/errata/2006/0074/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2006/0074/"},{"reference_url":"http://www.vupen.com/english/advisories/2006/5002","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/5002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=537273","reference_id":"537273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=537273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6304","reference_id":"CVE-2006-6304","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"}],"fixed_packages":[],"aliases":["CVE-2006-6304"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h61x-6rtm-w7b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88045?format=json","vulnerability_id":"VCID-k6jn-xb74-kyex","summary":"kernel: megaraid_sas permissions in sysfs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3939.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3939.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3939","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13272","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3939"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526068","reference_id":"526068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1635","reference_id":"RHSA-2009:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0076","reference_id":"RHSA-2010:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0076"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3939"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6jn-xb74-kyex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88018?format=json","vulnerability_id":"VCID-mwme-pa6q-q7d4","summary":"kernel: fuse: prevent fuse_put_request on invalid pointer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4021.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4021","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16697","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16518","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16443","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16398","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4021"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=538734","reference_id":"538734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=538734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0041","reference_id":"RHSA-2010:0041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://usn.ubuntu.com/894-1/","reference_id":"USN-894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/894-1/"}],"fixed_packages":[],"aliases":["CVE-2009-4021"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwme-pa6q-q7d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87968?format=json","vulnerability_id":"VCID-zha6-q3tu-p7cs","summary":"kernel: hfs buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4020","reference_id":"","reference_type":"","scores":[{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.8811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88123","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03814","scoring_system":"epss","scoring_elements":"0.88143","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=540736","reference_id":"540736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=540736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0076","reference_id":"RHSA-2010:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0076"},{"reference_url":"https://usn.ubuntu.com/894-1/","reference_id":"USN-894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/894-1/"}],"fixed_packages":[],"aliases":["CVE-2009-4020"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zha6-q3tu-p7cs"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-164.11.1%3Farch=el5"}