Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.9-78.0.8?arch=EL
Typerpm
Namespaceredhat
Namekernel
Version2.6.9-78.0.8
Qualifiers
arch EL
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-56pn-afy1-p3h6
vulnerability_id VCID-56pn-afy1-p3h6
summary Linux kernel ext[234] directory corruption denial of service
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
6
reference_url http://lkml.org/lkml/2008/9/13/98
reference_id
reference_type
scores
url http://lkml.org/lkml/2008/9/13/98
7
reference_url http://lkml.org/lkml/2008/9/13/99
reference_id
reference_type
scores
url http://lkml.org/lkml/2008/9/13/99
8
reference_url http://lkml.org/lkml/2008/9/17/371
reference_id
reference_type
scores
url http://lkml.org/lkml/2008/9/17/371
9
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3528.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3528
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-05-07T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.5754
published_at 2026-04-01T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57624
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57645
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.5762
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57674
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57679
published_at 2026-04-09T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57693
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57672
published_at 2026-04-12T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57652
published_at 2026-04-13T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57682
published_at 2026-04-16T12:55:00Z
11
value 0.00352
scoring_system epss
scoring_elements 0.57678
published_at 2026-04-18T12:55:00Z
12
value 0.00352
scoring_system epss
scoring_elements 0.57657
published_at 2026-04-21T12:55:00Z
13
value 0.00352
scoring_system epss
scoring_elements 0.57615
published_at 2026-04-24T12:55:00Z
14
value 0.00352
scoring_system epss
scoring_elements 0.57634
published_at 2026-04-26T12:55:00Z
15
value 0.00352
scoring_system epss
scoring_elements 0.57613
published_at 2026-04-29T12:55:00Z
16
value 0.00352
scoring_system epss
scoring_elements 0.57569
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3528
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
14
reference_url http://secunia.com/advisories/32509
reference_id
reference_type
scores
url http://secunia.com/advisories/32509
15
reference_url http://secunia.com/advisories/32709
reference_id
reference_type
scores
url http://secunia.com/advisories/32709
16
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
17
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
18
reference_url http://secunia.com/advisories/32998
reference_id
reference_type
scores
url http://secunia.com/advisories/32998
19
reference_url http://secunia.com/advisories/33180
reference_id
reference_type
scores
url http://secunia.com/advisories/33180
20
reference_url http://secunia.com/advisories/33586
reference_id
reference_type
scores
url http://secunia.com/advisories/33586
21
reference_url http://secunia.com/advisories/33758
reference_id
reference_type
scores
url http://secunia.com/advisories/33758
22
reference_url http://secunia.com/advisories/37471
reference_id
reference_type
scores
url http://secunia.com/advisories/37471
23
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45720
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45720
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10852
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10852
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8642
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8642
26
reference_url http://wiki.rpath.com/Advisories:rPSA-2008-0316
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2008-0316
27
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0316
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0316
28
reference_url http://www.debian.org/security/2008/dsa-1681
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1681
29
reference_url http://www.debian.org/security/2008/dsa-1687
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1687
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:224
31
reference_url http://www.openwall.com/lists/oss-security/2008/09/18/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/18/2
32
reference_url http://www.redhat.com/support/errata/RHSA-2009-0009.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0009.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2009-0326.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0326.html
34
reference_url http://www.securityfocus.com/archive/1/498285/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498285/100/0/threaded
35
reference_url http://www.securityfocus.com/archive/1/507985/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/507985/100/0/threaded
36
reference_url http://www.ubuntu.com/usn/usn-662-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-662-1
37
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
38
reference_url http://www.vupen.com/english/advisories/2009/3316
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/3316
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=459577
reference_id 459577
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=459577
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3528
reference_id CVE-2008-3528
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3528
42
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
43
reference_url https://access.redhat.com/errata/RHSA-2009:0009
reference_id RHSA-2009:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0009
44
reference_url https://access.redhat.com/errata/RHSA-2009:0326
reference_id RHSA-2009:0326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0326
45
reference_url https://usn.ubuntu.com/662-1/
reference_id USN-662-1
reference_type
scores
url https://usn.ubuntu.com/662-1/
fixed_packages
aliases CVE-2008-3528
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56pn-afy1-p3h6
1
url VCID-eqej-217s-5kfk
vulnerability_id VCID-eqej-217s-5kfk
summary kernel: ptrace: Padding area write - unprivileged kernel crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1514.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1514.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1514
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25146
published_at 2026-04-01T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25226
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25266
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25039
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25108
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25152
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25166
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25124
published_at 2026-04-12T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25071
published_at 2026-04-13T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25082
published_at 2026-04-16T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25073
published_at 2026-04-18T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25045
published_at 2026-04-21T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-24T12:55:00Z
13
value 0.00088
scoring_system epss
scoring_elements 0.24972
published_at 2026-04-26T12:55:00Z
14
value 0.00088
scoring_system epss
scoring_elements 0.24927
published_at 2026-04-29T12:55:00Z
15
value 0.00088
scoring_system epss
scoring_elements 0.24807
published_at 2026-05-05T12:55:00Z
16
value 0.00088
scoring_system epss
scoring_elements 0.24879
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1514
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=438147
reference_id 438147
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=438147
3
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
fixed_packages
aliases CVE-2008-1514
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqej-217s-5kfk
2
url VCID-h33p-qqhj-43gw
vulnerability_id VCID-h33p-qqhj-43gw
summary kernel snd_seq_oss_synth_make_info leak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82e68f7ffec3800425f2391c8c86277606860442
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82e68f7ffec3800425f2391c8c86277606860442
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.27-rc2
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.27-rc2
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3272.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3272.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3272
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19448
published_at 2026-05-07T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19684
published_at 2026-04-01T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19829
published_at 2026-04-02T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19883
published_at 2026-04-04T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.1961
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1969
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19742
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19746
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19697
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19639
published_at 2026-04-13T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19616
published_at 2026-04-16T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19618
published_at 2026-04-18T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19633
published_at 2026-04-21T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19525
published_at 2026-04-24T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.19513
published_at 2026-04-26T12:55:00Z
15
value 0.00063
scoring_system epss
scoring_elements 0.19474
published_at 2026-04-29T12:55:00Z
16
value 0.00063
scoring_system epss
scoring_elements 0.1936
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3272
10
reference_url http://secunia.com/advisories/31366
reference_id
reference_type
scores
url http://secunia.com/advisories/31366
11
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
12
reference_url http://secunia.com/advisories/31614
reference_id
reference_type
scores
url http://secunia.com/advisories/31614
13
reference_url http://secunia.com/advisories/31836
reference_id
reference_type
scores
url http://secunia.com/advisories/31836
14
reference_url http://secunia.com/advisories/31881
reference_id
reference_type
scores
url http://secunia.com/advisories/31881
15
reference_url http://secunia.com/advisories/32023
reference_id
reference_type
scores
url http://secunia.com/advisories/32023
16
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
17
reference_url http://secunia.com/advisories/32104
reference_id
reference_type
scores
url http://secunia.com/advisories/32104
18
reference_url http://secunia.com/advisories/32190
reference_id
reference_type
scores
url http://secunia.com/advisories/32190
19
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
20
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
21
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44225
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44225
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11182
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11182
24
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
25
reference_url http://www.debian.org/security/2008/dsa-1636
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1636
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0857.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0857.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2008-0885.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0885.html
29
reference_url http://www.securityfocus.com/bid/30559
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30559
30
reference_url http://www.securitytracker.com/id?1020636
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020636
31
reference_url http://www.vupen.com/english/advisories/2008/2307
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2307
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457995
reference_id 457995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457995
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.27:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3272
reference_id CVE-2008-3272
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-3272
46
reference_url https://access.redhat.com/errata/RHSA-2008:0857
reference_id RHSA-2008:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0857
47
reference_url https://access.redhat.com/errata/RHSA-2008:0885
reference_id RHSA-2008:0885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0885
48
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
49
reference_url https://usn.ubuntu.com/637-1/
reference_id USN-637-1
reference_type
scores
url https://usn.ubuntu.com/637-1/
fixed_packages
aliases CVE-2008-3272
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h33p-qqhj-43gw
3
url VCID-hjz4-81cy-w7az
vulnerability_id VCID-hjz4-81cy-w7az
summary kernel: open() call allows setgid bit when user is not in new file's group
references
0
reference_url http://bugzilla.kernel.org/show_bug.cgi?id=8420
reference_id
reference_type
scores
url http://bugzilla.kernel.org/show_bug.cgi?id=8420
1
reference_url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
2
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
reference_id
reference_type
scores
0
value 0.113
scoring_system epss
scoring_elements 0.93583
published_at 2026-05-07T12:55:00Z
1
value 0.113
scoring_system epss
scoring_elements 0.93494
published_at 2026-04-01T12:55:00Z
2
value 0.113
scoring_system epss
scoring_elements 0.93503
published_at 2026-04-02T12:55:00Z
3
value 0.113
scoring_system epss
scoring_elements 0.93511
published_at 2026-04-07T12:55:00Z
4
value 0.113
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-08T12:55:00Z
5
value 0.113
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-09T12:55:00Z
6
value 0.113
scoring_system epss
scoring_elements 0.93527
published_at 2026-04-13T12:55:00Z
7
value 0.113
scoring_system epss
scoring_elements 0.93546
published_at 2026-04-16T12:55:00Z
8
value 0.113
scoring_system epss
scoring_elements 0.93552
published_at 2026-04-18T12:55:00Z
9
value 0.113
scoring_system epss
scoring_elements 0.93559
published_at 2026-04-21T12:55:00Z
10
value 0.113
scoring_system epss
scoring_elements 0.93564
published_at 2026-04-24T12:55:00Z
11
value 0.113
scoring_system epss
scoring_elements 0.93563
published_at 2026-04-26T12:55:00Z
12
value 0.113
scoring_system epss
scoring_elements 0.93561
published_at 2026-04-29T12:55:00Z
13
value 0.113
scoring_system epss
scoring_elements 0.93569
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
10
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
11
reference_url http://secunia.com/advisories/32344
reference_id
reference_type
scores
url http://secunia.com/advisories/32344
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32485
reference_id
reference_type
scores
url http://secunia.com/advisories/32485
14
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
15
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
16
reference_url http://secunia.com/advisories/32918
reference_id
reference_type
scores
url http://secunia.com/advisories/32918
17
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
18
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
22
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
23
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
25
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/5
26
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/8
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2008-0957.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0957.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
30
reference_url http://www.securityfocus.com/bid/31368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31368
31
reference_url http://www.ubuntu.com/usn/usn-679-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-679-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463661
reference_id 463661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463661
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
reference_id CVE-2008-4210
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
64
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
reference_id OSVDB-49081;CVE-2008-4210
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
65
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
66
reference_url https://access.redhat.com/errata/RHSA-2008:0957
reference_id RHSA-2008:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0957
67
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
68
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
69
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
70
reference_url https://usn.ubuntu.com/679-1/
reference_id USN-679-1
reference_type
scores
url https://usn.ubuntu.com/679-1/
fixed_packages
aliases CVE-2008-4210
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjz4-81cy-w7az
4
url VCID-hypr-z432-eqf9
vulnerability_id VCID-hypr-z432-eqf9
summary kernel: dio: zero struct dio with kzalloc instead of manually
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=848c4dd5153c7a0de55470ce99a8e13a63b4703f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=848c4dd5153c7a0de55470ce99a8e13a63b4703f
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
6
reference_url http://lkml.org/lkml/2007/7/30/448
reference_id
reference_type
scores
url http://lkml.org/lkml/2007/7/30/448
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6716.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6716.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6716
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14896
published_at 2026-05-07T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14771
published_at 2026-05-05T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15032
published_at 2026-04-01T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.15074
published_at 2026-04-02T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.15142
published_at 2026-04-04T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14947
published_at 2026-04-07T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.15034
published_at 2026-04-08T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.15086
published_at 2026-04-09T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.15053
published_at 2026-04-11T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.15015
published_at 2026-04-12T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14956
published_at 2026-04-13T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14854
published_at 2026-04-16T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14861
published_at 2026-04-18T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.14914
published_at 2026-04-21T12:55:00Z
14
value 0.00048
scoring_system epss
scoring_elements 0.14951
published_at 2026-04-24T12:55:00Z
15
value 0.00048
scoring_system epss
scoring_elements 0.14954
published_at 2026-04-26T12:55:00Z
16
value 0.00048
scoring_system epss
scoring_elements 0.14897
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6716
10
reference_url http://secunia.com/advisories/32023
reference_id
reference_type
scores
url http://secunia.com/advisories/32023
11
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
12
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
13
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
14
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
15
reference_url http://secunia.com/advisories/32393
reference_id
reference_type
scores
url http://secunia.com/advisories/32393
16
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
17
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10053
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10053
19
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
20
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
22
reference_url http://www.openwall.com/lists/oss-security/2008/09/04/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/04/1
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-0885.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0885.html
24
reference_url http://www.securityfocus.com/bid/31515
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31515
25
reference_url http://www.ubuntu.com/usn/usn-659-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-659-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461082
reference_id 461082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461082
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-6716
reference_id CVE-2007-6716
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2007-6716
38
reference_url https://access.redhat.com/errata/RHSA-2008:0885
reference_id RHSA-2008:0885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0885
39
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
40
reference_url https://usn.ubuntu.com/659-1/
reference_id USN-659-1
reference_type
scores
url https://usn.ubuntu.com/659-1/
fixed_packages
aliases CVE-2007-6716
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hypr-z432-eqf9
5
url VCID-qst8-gdpb-sfct
vulnerability_id VCID-qst8-gdpb-sfct
summary kernel PWC driver DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5093.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5093.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5093
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19265
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19316
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19032
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19111
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19165
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19171
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19072
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19029
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19041
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19049
published_at 2026-04-21T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18942
published_at 2026-04-24T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18926
published_at 2026-04-26T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18884
published_at 2026-04-29T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.1876
published_at 2026-05-05T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.18844
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5093
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=306591
reference_id 306591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=306591
3
reference_url https://access.redhat.com/errata/RHSA-2008:0275
reference_id RHSA-2008:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0275
4
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
5
reference_url https://usn.ubuntu.com/558-1/
reference_id USN-558-1
reference_type
scores
url https://usn.ubuntu.com/558-1/
6
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
7
reference_url https://usn.ubuntu.com/578-1/
reference_id USN-578-1
reference_type
scores
url https://usn.ubuntu.com/578-1/
fixed_packages
aliases CVE-2007-5093
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qst8-gdpb-sfct
Fixing_vulnerabilities
Risk_score8.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-78.0.8%3Farch=EL