{"url":"http://public2.vulnerablecode.io/api/packages/128487?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-89.0.3?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.9-89.0.3","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88158?format=json","vulnerability_id":"VCID-56kj-9df7-9kf8","summary":"kernel: xen: local denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1758.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1758","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71391","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71382","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1758"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=500945","reference_id":"500945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=500945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1106","reference_id":"RHSA-2009:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1132","reference_id":"RHSA-2009:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1132"}],"fixed_packages":[],"aliases":["CVE-2009-1758"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-56kj-9df7-9kf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88716?format=json","vulnerability_id":"VCID-hrtb-25bb-hqd5","summary":"kernel: e1000_clean_rx_irq() denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1385.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1385","reference_id":"","reference_type":"","scores":[{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94266","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94297","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94322","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94326","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.9433","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94335","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94356","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94363","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13893","scoring_system":"epss","scoring_elements":"0.94369","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=502981","reference_id":"502981","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=502981"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1132","reference_id":"RHSA-2009:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1157","reference_id":"RHSA-2009:1157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1193","reference_id":"RHSA-2009:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1550","reference_id":"RHSA-2009:1550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0079","reference_id":"RHSA-2010:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0079"},{"reference_url":"https://usn.ubuntu.com/793-1/","reference_id":"USN-793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/793-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1385"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrtb-25bb-hqd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88162?format=json","vulnerability_id":"VCID-mmhe-7rus-k7gm","summary":"kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1630.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1630","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29335","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28963","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28744","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28743","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28763","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=500297","reference_id":"500297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=500297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1106","reference_id":"RHSA-2009:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1132","reference_id":"RHSA-2009:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1157","reference_id":"RHSA-2009:1157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1157"},{"reference_url":"https://usn.ubuntu.com/793-1/","reference_id":"USN-793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/793-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1630"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmhe-7rus-k7gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88195?format=json","vulnerability_id":"VCID-pj2a-gk14-37cw","summary":"kernel: nfsd should drop CAP_MKNOD for non-root","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=76a67ec6fb79ff3570dcb5342142c16098299911","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=76a67ec6fb79ff3570dcb5342142c16098299911"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1072.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1072","reference_id":"","reference_type":"","scores":[{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69345","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69318","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69351","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6932","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1072"},{"reference_url":"http://secunia.com/advisories/34422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34422"},{"reference_url":"http://secunia.com/advisories/34432","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34432"},{"reference_url":"http://secunia.com/advisories/34786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34786"},{"reference_url":"http://secunia.com/advisories/35121","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35121"},{"reference_url":"http://secunia.com/advisories/35185","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35185"},{"reference_url":"http://secunia.com/advisories/35343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35343"},{"reference_url":"http://secunia.com/advisories/35390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35390"},{"reference_url":"http://secunia.com/advisories/35394","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35394"},{"reference_url":"http://secunia.com/advisories/35656","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35656"},{"reference_url":"http://secunia.com/advisories/37471","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37471"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49356","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49356"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382"},{"reference_url":"http://thread.gmane.org/gmane.linux.kernel/805280","reference_id":"","reference_type":"","scores":[],"url":"http://thread.gmane.org/gmane.linux.kernel/805280"},{"reference_url":"http://www.debian.org/security/2009/dsa-1800","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1800"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/03/23/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2009/03/23/1"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-1081.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-1081.html"},{"reference_url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34205","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34205"},{"reference_url":"http://www.ubuntu.com/usn/usn-793-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-793-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0802","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0802"},{"reference_url":"http://www.vupen.com/english/advisories/2009/3316","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/3316"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491572","reference_id":"491572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491572"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1072","reference_id":"CVE-2009-1072","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1081","reference_id":"RHSA-2009:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1106","reference_id":"RHSA-2009:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1132","reference_id":"RHSA-2009:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1132"},{"reference_url":"https://usn.ubuntu.com/793-1/","reference_id":"USN-793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/793-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1072"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pj2a-gk14-37cw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88180?format=json","vulnerability_id":"VCID-pzxg-1ung-f3ex","summary":"kernel: agp: zero pages before sending to userspace","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1192.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1192","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25593","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25664","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25466","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2525","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25317","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25299","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25316","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=497020","reference_id":"497020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=497020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1081","reference_id":"RHSA-2009:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1106","reference_id":"RHSA-2009:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1132","reference_id":"RHSA-2009:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1132"},{"reference_url":"https://usn.ubuntu.com/793-1/","reference_id":"USN-793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/793-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1192"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzxg-1ung-f3ex"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-89.0.3%3Farch=EL"}