Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.4.18-e?arch=67
Typerpm
Namespaceredhat
Namekernel
Version2.4.18-e
Qualifiers
arch 67
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6a1a-z32k-3bec
vulnerability_id VCID-6a1a-z32k-3bec
summary kernel: insufficient range checks in fault handlers with mremap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0007
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28955
published_at 2026-04-01T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.2903
published_at 2026-04-02T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.2908
published_at 2026-04-04T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.2889
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28958
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.29
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.29004
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28959
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.2891
published_at 2026-04-18T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28934
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28863
published_at 2026-04-21T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28744
published_at 2026-04-24T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28633
published_at 2026-04-26T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.28563
published_at 2026-04-29T12:55:00Z
14
value 0.00107
scoring_system epss
scoring_elements 0.28405
published_at 2026-05-05T12:55:00Z
15
value 0.00107
scoring_system epss
scoring_elements 0.28463
published_at 2026-05-07T12:55:00Z
16
value 0.00107
scoring_system epss
scoring_elements 0.28485
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0007
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=428961
reference_id 428961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=428961
3
reference_url https://access.redhat.com/errata/RHSA-2008:0211
reference_id RHSA-2008:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0211
4
reference_url https://access.redhat.com/errata/RHSA-2008:0233
reference_id RHSA-2008:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0233
5
reference_url https://access.redhat.com/errata/RHSA-2008:0237
reference_id RHSA-2008:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0237
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/618-1/
reference_id USN-618-1
reference_type
scores
url https://usn.ubuntu.com/618-1/
fixed_packages
aliases CVE-2008-0007
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6a1a-z32k-3bec
1
url VCID-8zkt-6zb3-c3gx
vulnerability_id VCID-8zkt-6zb3-c3gx
summary fib_semantics.c out of bounds access vulnerability
references
0
reference_url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
1
reference_url http://rhn.redhat.com/errata/RHSA-2007-0488.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0488.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21606
published_at 2026-05-09T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21708
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21927
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21692
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.2177
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21826
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21837
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21797
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21747
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-21T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21566
published_at 2026-04-24T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2156
published_at 2026-04-26T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-29T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21455
published_at 2026-05-05T12:55:00Z
16
value 0.00071
scoring_system epss
scoring_elements 0.2152
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
4
reference_url http://secunia.com/advisories/25068
reference_id
reference_type
scores
url http://secunia.com/advisories/25068
5
reference_url http://secunia.com/advisories/25288
reference_id
reference_type
scores
url http://secunia.com/advisories/25288
6
reference_url http://secunia.com/advisories/25392
reference_id
reference_type
scores
url http://secunia.com/advisories/25392
7
reference_url http://secunia.com/advisories/25838
reference_id
reference_type
scores
url http://secunia.com/advisories/25838
8
reference_url http://secunia.com/advisories/26289
reference_id
reference_type
scores
url http://secunia.com/advisories/26289
9
reference_url http://secunia.com/advisories/26450
reference_id
reference_type
scores
url http://secunia.com/advisories/26450
10
reference_url http://secunia.com/advisories/26620
reference_id
reference_type
scores
url http://secunia.com/advisories/26620
11
reference_url http://secunia.com/advisories/26647
reference_id
reference_type
scores
url http://secunia.com/advisories/26647
12
reference_url http://secunia.com/advisories/27913
reference_id
reference_type
scores
url http://secunia.com/advisories/27913
13
reference_url http://secunia.com/advisories/29058
reference_id
reference_type
scores
url http://secunia.com/advisories/29058
14
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
17
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
18
reference_url http://www.debian.org/security/2007/dsa-1356
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1356
19
reference_url http://www.debian.org/security/2007/dsa-1363
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1363
20
reference_url http://www.debian.org/security/2008/dsa-1503
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1503
21
reference_url http://www.debian.org/security/2008/dsa-1504
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1504
22
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
23
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
24
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
28
reference_url http://www.redhat.com/support/errata/RHSA-2007-0347.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0347.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-1049.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-1049.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
31
reference_url http://www.securityfocus.com/bid/23447
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23447
32
reference_url http://www.ubuntu.com/usn/usn-464-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-464-1
33
reference_url http://www.vupen.com/english/advisories/2007/2690
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2690
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250429
reference_id 250429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250429
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
reference_id CVE-2007-2172
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
54
reference_url https://access.redhat.com/errata/RHSA-2007:0347
reference_id RHSA-2007:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0347
55
reference_url https://access.redhat.com/errata/RHSA-2007:0488
reference_id RHSA-2007:0488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0488
56
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
57
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
58
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
59
reference_url https://usn.ubuntu.com/464-1/
reference_id USN-464-1
reference_type
scores
url https://usn.ubuntu.com/464-1/
fixed_packages
aliases CVE-2007-2172
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx
2
url VCID-9epb-x1za-vyed
vulnerability_id VCID-9epb-x1za-vyed
summary Linux Kernel isdn_net_setcfg buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6063
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36472
published_at 2026-04-01T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36647
published_at 2026-04-02T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36679
published_at 2026-04-04T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36517
published_at 2026-04-07T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36569
published_at 2026-04-08T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36588
published_at 2026-04-09T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36594
published_at 2026-04-11T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36559
published_at 2026-04-12T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36535
published_at 2026-04-13T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36579
published_at 2026-04-16T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36562
published_at 2026-04-18T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36506
published_at 2026-04-21T12:55:00Z
12
value 0.00157
scoring_system epss
scoring_elements 0.36277
published_at 2026-04-24T12:55:00Z
13
value 0.00157
scoring_system epss
scoring_elements 0.36246
published_at 2026-04-26T12:55:00Z
14
value 0.00157
scoring_system epss
scoring_elements 0.3616
published_at 2026-04-29T12:55:00Z
15
value 0.00157
scoring_system epss
scoring_elements 0.36043
published_at 2026-05-05T12:55:00Z
16
value 0.00157
scoring_system epss
scoring_elements 0.36111
published_at 2026-05-07T12:55:00Z
17
value 0.00157
scoring_system epss
scoring_elements 0.36138
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6063
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392101
reference_id 392101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392101
3
reference_url https://access.redhat.com/errata/RHSA-2008:0055
reference_id RHSA-2008:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0055
4
reference_url https://access.redhat.com/errata/RHSA-2008:0154
reference_id RHSA-2008:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0154
5
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
6
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
9
reference_url https://usn.ubuntu.com/578-1/
reference_id USN-578-1
reference_type
scores
url https://usn.ubuntu.com/578-1/
fixed_packages
aliases CVE-2007-6063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9epb-x1za-vyed
3
url VCID-cf2v-zn7q-b3gd
vulnerability_id VCID-cf2v-zn7q-b3gd
summary Linux kernel local filesystem DoS
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
4
reference_url http://lkml.org/lkml/2008/7/2/83
reference_id
reference_type
scores
url http://lkml.org/lkml/2008/7/2/83
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3275
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22832
published_at 2026-05-09T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22756
published_at 2026-05-07T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.22927
published_at 2026-04-01T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23094
published_at 2026-04-02T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23138
published_at 2026-04-04T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22929
published_at 2026-04-07T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23003
published_at 2026-04-08T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23055
published_at 2026-04-09T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23075
published_at 2026-04-11T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-12T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22982
published_at 2026-04-13T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22996
published_at 2026-04-16T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22988
published_at 2026-04-18T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.22951
published_at 2026-04-21T12:55:00Z
14
value 0.00077
scoring_system epss
scoring_elements 0.22782
published_at 2026-04-24T12:55:00Z
15
value 0.00077
scoring_system epss
scoring_elements 0.22776
published_at 2026-04-26T12:55:00Z
16
value 0.00077
scoring_system epss
scoring_elements 0.2277
published_at 2026-04-29T12:55:00Z
17
value 0.00077
scoring_system epss
scoring_elements 0.22671
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3275
7
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
8
reference_url http://secunia.com/advisories/31614
reference_id
reference_type
scores
url http://secunia.com/advisories/31614
9
reference_url http://secunia.com/advisories/31836
reference_id
reference_type
scores
url http://secunia.com/advisories/31836
10
reference_url http://secunia.com/advisories/31881
reference_id
reference_type
scores
url http://secunia.com/advisories/31881
11
reference_url http://secunia.com/advisories/32023
reference_id
reference_type
scores
url http://secunia.com/advisories/32023
12
reference_url http://secunia.com/advisories/32104
reference_id
reference_type
scores
url http://secunia.com/advisories/32104
13
reference_url http://secunia.com/advisories/32190
reference_id
reference_type
scores
url http://secunia.com/advisories/32190
14
reference_url http://secunia.com/advisories/32344
reference_id
reference_type
scores
url http://secunia.com/advisories/32344
15
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
16
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
17
reference_url http://secunia.com/advisories/33556
reference_id
reference_type
scores
url http://secunia.com/advisories/33556
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44410
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44410
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551
21
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
22
reference_url http://www.debian.org/security/2008/dsa-1636
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1636
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
24
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2008-0857.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0857.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2008-0885.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0885.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2009-0014.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0014.html
29
reference_url http://www.securityfocus.com/bid/30647
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30647
30
reference_url http://www.securitytracker.com/id?1020739
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020739
31
reference_url http://www.vupen.com/english/advisories/2008/2430
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2430
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457858
reference_id 457858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457858
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3275
reference_id CVE-2008-3275
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2008-3275
42
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
43
reference_url https://access.redhat.com/errata/RHSA-2008:0857
reference_id RHSA-2008:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0857
44
reference_url https://access.redhat.com/errata/RHSA-2008:0885
reference_id RHSA-2008:0885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0885
45
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
46
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
47
reference_url https://access.redhat.com/errata/RHSA-2009:0014
reference_id RHSA-2009:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0014
48
reference_url https://usn.ubuntu.com/637-1/
reference_id USN-637-1
reference_type
scores
url https://usn.ubuntu.com/637-1/
fixed_packages
aliases CVE-2008-3275
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2v-zn7q-b3gd
4
url VCID-d3j2-c5ey-pqbe
vulnerability_id VCID-d3j2-c5ey-pqbe
summary I4L: fix isdn_ioctl memory issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6151
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18371
published_at 2026-04-01T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18519
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18574
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1828
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18363
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18416
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18415
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18368
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18316
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.1826
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18272
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18297
published_at 2026-04-21T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18198
published_at 2026-04-24T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18182
published_at 2026-04-26T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.18144
published_at 2026-04-29T12:55:00Z
15
value 0.00058
scoring_system epss
scoring_elements 0.18005
published_at 2026-05-05T12:55:00Z
16
value 0.00058
scoring_system epss
scoring_elements 0.18094
published_at 2026-05-07T12:55:00Z
17
value 0.00058
scoring_system epss
scoring_elements 0.18196
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6151
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=425111
reference_id 425111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=425111
3
reference_url https://access.redhat.com/errata/RHSA-2008:0055
reference_id RHSA-2008:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0055
4
reference_url https://access.redhat.com/errata/RHSA-2008:0211
reference_id RHSA-2008:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0211
5
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
6
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
7
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
8
reference_url https://usn.ubuntu.com/578-1/
reference_id USN-578-1
reference_type
scores
url https://usn.ubuntu.com/578-1/
fixed_packages
aliases CVE-2007-6151
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3j2-c5ey-pqbe
5
url VCID-d91v-h4jm-bffj
vulnerability_id VCID-d91v-h4jm-bffj
summary kernel Race condition in mincore can cause "ps -ef" to hang
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2008/000023.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2008/000023.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2007-0014.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0014.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4814
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25462
published_at 2026-05-09T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.2568
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.2575
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25791
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.2556
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25633
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25679
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.2569
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25649
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25592
published_at 2026-04-13T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-16T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25579
published_at 2026-04-18T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25551
published_at 2026-04-21T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25503
published_at 2026-04-24T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25496
published_at 2026-04-26T12:55:00Z
15
value 0.00091
scoring_system epss
scoring_elements 0.25447
published_at 2026-04-29T12:55:00Z
16
value 0.00091
scoring_system epss
scoring_elements 0.25334
published_at 2026-05-05T12:55:00Z
17
value 0.00091
scoring_system epss
scoring_elements 0.25401
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4814
4
reference_url http://secunia.com/advisories/23436
reference_id
reference_type
scores
url http://secunia.com/advisories/23436
5
reference_url http://secunia.com/advisories/23609
reference_id
reference_type
scores
url http://secunia.com/advisories/23609
6
reference_url http://secunia.com/advisories/23997
reference_id
reference_type
scores
url http://secunia.com/advisories/23997
7
reference_url http://secunia.com/advisories/24098
reference_id
reference_type
scores
url http://secunia.com/advisories/24098
8
reference_url http://secunia.com/advisories/24100
reference_id
reference_type
scores
url http://secunia.com/advisories/24100
9
reference_url http://secunia.com/advisories/24206
reference_id
reference_type
scores
url http://secunia.com/advisories/24206
10
reference_url http://secunia.com/advisories/24482
reference_id
reference_type
scores
url http://secunia.com/advisories/24482
11
reference_url http://secunia.com/advisories/25691
reference_id
reference_type
scores
url http://secunia.com/advisories/25691
12
reference_url http://secunia.com/advisories/25714
reference_id
reference_type
scores
url http://secunia.com/advisories/25714
13
reference_url http://secunia.com/advisories/29058
reference_id
reference_type
scores
url http://secunia.com/advisories/29058
14
reference_url http://secunia.com/advisories/30110
reference_id
reference_type
scores
url http://secunia.com/advisories/30110
15
reference_url http://secunia.com/advisories/31246
reference_id
reference_type
scores
url http://secunia.com/advisories/31246
16
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648
18
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
19
reference_url http://www.debian.org/security/2007/dsa-1304
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1304
20
reference_url http://www.debian.org/security/2008/dsa-1503
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1503
21
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
23
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
24
reference_url http://www.novell.com/linux/security/advisories/2007_18_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_18_kernel.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2008-0211.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0211.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
27
reference_url http://www.securityfocus.com/archive/1/471457
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471457
28
reference_url http://www.securityfocus.com/bid/21663
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21663
29
reference_url http://www.trustix.org/errata/2007/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0002/
30
reference_url http://www.ubuntu.com/usn/usn-416-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-416-1
31
reference_url http://www.vupen.com/english/advisories/2006/5082
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/5082
32
reference_url http://www.vupen.com/english/advisories/2008/2222/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2222/references
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=306971
reference_id 306971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=306971
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-4814
reference_id CVE-2006-4814
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-4814
119
reference_url https://access.redhat.com/errata/RHSA-2007:0014
reference_id RHSA-2007:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0014
120
reference_url https://access.redhat.com/errata/RHSA-2008:0211
reference_id RHSA-2008:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0211
121
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
122
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
123
reference_url https://usn.ubuntu.com/416-1/
reference_id USN-416-1
reference_type
scores
url https://usn.ubuntu.com/416-1/
fixed_packages
aliases CVE-2006-4814
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d91v-h4jm-bffj
6
url VCID-dajb-npd8-6bhn
vulnerability_id VCID-dajb-npd8-6bhn
summary Privilege escalation via PR_SET_PDEATHSIG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3848
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24135
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24901
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.2494
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24713
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24781
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2484
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24801
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24744
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24748
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24726
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24665
published_at 2026-04-24T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24653
published_at 2026-04-26T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24609
published_at 2026-04-29T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24486
published_at 2026-05-05T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24564
published_at 2026-05-07T12:55:00Z
17
value 0.00086
scoring_system epss
scoring_elements 0.24628
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3848
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250972
reference_id 250972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250972
3
reference_url https://access.redhat.com/errata/RHSA-2007:0939
reference_id RHSA-2007:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0939
4
reference_url https://access.redhat.com/errata/RHSA-2007:0940
reference_id RHSA-2007:0940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0940
5
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/508-1/
reference_id USN-508-1
reference_type
scores
url https://usn.ubuntu.com/508-1/
9
reference_url https://usn.ubuntu.com/509-1/
reference_id USN-509-1
reference_type
scores
url https://usn.ubuntu.com/509-1/
10
reference_url https://usn.ubuntu.com/510-1/
reference_id USN-510-1
reference_type
scores
url https://usn.ubuntu.com/510-1/
fixed_packages
aliases CVE-2007-3848
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dajb-npd8-6bhn
7
url VCID-dk79-tsxh-jqfa
vulnerability_id VCID-dk79-tsxh-jqfa
summary Issue with core dump owner
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6206
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17536
published_at 2026-05-09T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17653
published_at 2026-04-21T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17563
published_at 2026-04-24T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17539
published_at 2026-04-26T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17483
published_at 2026-04-29T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17347
published_at 2026-05-05T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17439
published_at 2026-05-07T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17761
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17715
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17664
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17609
published_at 2026-04-16T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17617
published_at 2026-04-18T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-02T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22917
published_at 2026-04-04T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22709
published_at 2026-04-07T12:55:00Z
15
value 0.00076
scoring_system epss
scoring_elements 0.22785
published_at 2026-04-08T12:55:00Z
16
value 0.00076
scoring_system epss
scoring_elements 0.22837
published_at 2026-04-09T12:55:00Z
17
value 0.00076
scoring_system epss
scoring_elements 0.22696
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6206
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=396861
reference_id 396861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=396861
3
reference_url https://access.redhat.com/errata/RHSA-2008:0055
reference_id RHSA-2008:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0055
4
reference_url https://access.redhat.com/errata/RHSA-2008:0089
reference_id RHSA-2008:0089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0089
5
reference_url https://access.redhat.com/errata/RHSA-2008:0211
reference_id RHSA-2008:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0211
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
9
reference_url https://usn.ubuntu.com/578-1/
reference_id USN-578-1
reference_type
scores
url https://usn.ubuntu.com/578-1/
fixed_packages
aliases CVE-2007-6206
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk79-tsxh-jqfa
8
url VCID-e1fa-s8q2-3fbv
vulnerability_id VCID-e1fa-s8q2-3fbv
summary kernel: sit memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
reference_id
reference_type
scores
0
value 0.23487
scoring_system epss
scoring_elements 0.95938
published_at 2026-04-01T12:55:00Z
1
value 0.23487
scoring_system epss
scoring_elements 0.95946
published_at 2026-04-02T12:55:00Z
2
value 0.23487
scoring_system epss
scoring_elements 0.95953
published_at 2026-04-04T12:55:00Z
3
value 0.23487
scoring_system epss
scoring_elements 0.95958
published_at 2026-04-07T12:55:00Z
4
value 0.23487
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-08T12:55:00Z
5
value 0.23487
scoring_system epss
scoring_elements 0.9597
published_at 2026-04-09T12:55:00Z
6
value 0.23487
scoring_system epss
scoring_elements 0.95974
published_at 2026-04-12T12:55:00Z
7
value 0.23487
scoring_system epss
scoring_elements 0.95976
published_at 2026-04-13T12:55:00Z
8
value 0.23487
scoring_system epss
scoring_elements 0.95986
published_at 2026-04-16T12:55:00Z
9
value 0.23487
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-18T12:55:00Z
10
value 0.23487
scoring_system epss
scoring_elements 0.95992
published_at 2026-04-29T12:55:00Z
11
value 0.23487
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-26T12:55:00Z
12
value 0.23487
scoring_system epss
scoring_elements 0.96002
published_at 2026-05-05T12:55:00Z
13
value 0.23487
scoring_system epss
scoring_elements 0.96006
published_at 2026-05-07T12:55:00Z
14
value 0.23487
scoring_system epss
scoring_elements 0.96009
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=446031
reference_id 446031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=446031
3
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
4
reference_url https://access.redhat.com/errata/RHSA-2008:0607
reference_id RHSA-2008:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0607
5
reference_url https://access.redhat.com/errata/RHSA-2008:0612
reference_id RHSA-2008:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0612
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
8
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
9
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2136
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv
9
url VCID-hjz4-81cy-w7az
vulnerability_id VCID-hjz4-81cy-w7az
summary kernel: open() call allows setgid bit when user is not in new file's group
references
0
reference_url http://bugzilla.kernel.org/show_bug.cgi?id=8420
reference_id
reference_type
scores
url http://bugzilla.kernel.org/show_bug.cgi?id=8420
1
reference_url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
2
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
reference_id
reference_type
scores
0
value 0.113
scoring_system epss
scoring_elements 0.93594
published_at 2026-05-09T12:55:00Z
1
value 0.113
scoring_system epss
scoring_elements 0.93494
published_at 2026-04-01T12:55:00Z
2
value 0.113
scoring_system epss
scoring_elements 0.93503
published_at 2026-04-02T12:55:00Z
3
value 0.113
scoring_system epss
scoring_elements 0.93511
published_at 2026-04-07T12:55:00Z
4
value 0.113
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-08T12:55:00Z
5
value 0.113
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-09T12:55:00Z
6
value 0.113
scoring_system epss
scoring_elements 0.93527
published_at 2026-04-13T12:55:00Z
7
value 0.113
scoring_system epss
scoring_elements 0.93546
published_at 2026-04-16T12:55:00Z
8
value 0.113
scoring_system epss
scoring_elements 0.93552
published_at 2026-04-18T12:55:00Z
9
value 0.113
scoring_system epss
scoring_elements 0.93559
published_at 2026-04-21T12:55:00Z
10
value 0.113
scoring_system epss
scoring_elements 0.93564
published_at 2026-04-24T12:55:00Z
11
value 0.113
scoring_system epss
scoring_elements 0.93563
published_at 2026-04-26T12:55:00Z
12
value 0.113
scoring_system epss
scoring_elements 0.93561
published_at 2026-04-29T12:55:00Z
13
value 0.113
scoring_system epss
scoring_elements 0.93569
published_at 2026-05-05T12:55:00Z
14
value 0.113
scoring_system epss
scoring_elements 0.93583
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
10
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
11
reference_url http://secunia.com/advisories/32344
reference_id
reference_type
scores
url http://secunia.com/advisories/32344
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32485
reference_id
reference_type
scores
url http://secunia.com/advisories/32485
14
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
15
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
16
reference_url http://secunia.com/advisories/32918
reference_id
reference_type
scores
url http://secunia.com/advisories/32918
17
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
18
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
22
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
23
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
25
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/5
26
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/8
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2008-0957.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0957.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
30
reference_url http://www.securityfocus.com/bid/31368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31368
31
reference_url http://www.ubuntu.com/usn/usn-679-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-679-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463661
reference_id 463661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463661
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
reference_id CVE-2008-4210
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
64
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
reference_id OSVDB-49081;CVE-2008-4210
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
65
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
66
reference_url https://access.redhat.com/errata/RHSA-2008:0957
reference_id RHSA-2008:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0957
67
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
68
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
69
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
70
reference_url https://usn.ubuntu.com/679-1/
reference_id USN-679-1
reference_type
scores
url https://usn.ubuntu.com/679-1/
fixed_packages
aliases CVE-2008-4210
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjz4-81cy-w7az
10
url VCID-mn7v-1n4p-z3f2
vulnerability_id VCID-mn7v-1n4p-z3f2
summary kernel: missing capability checks in sbni_ioctl()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3525
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19026
published_at 2026-05-09T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19208
published_at 2026-04-01T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19343
published_at 2026-04-02T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19395
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19112
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19191
published_at 2026-04-08T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19244
published_at 2026-04-09T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.1925
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19203
published_at 2026-04-12T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19148
published_at 2026-04-13T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19108
published_at 2026-04-16T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-18T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-21T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.19018
published_at 2026-04-24T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.19006
published_at 2026-04-26T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.18963
published_at 2026-04-29T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.18841
published_at 2026-05-05T12:55:00Z
17
value 0.00061
scoring_system epss
scoring_elements 0.18925
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3525
9
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
10
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
11
reference_url http://secunia.com/advisories/32315
reference_id
reference_type
scores
url http://secunia.com/advisories/32315
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
14
reference_url http://secunia.com/advisories/32386
reference_id
reference_type
scores
url http://secunia.com/advisories/32386
15
reference_url http://secunia.com/advisories/32393
reference_id
reference_type
scores
url http://secunia.com/advisories/32393
16
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
17
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
18
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
23
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
24
reference_url http://www.debian.org/security/2008/dsa-1655
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1655
25
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:223
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:223
28
reference_url http://www.openwall.com/lists/oss-security/2008/08/29/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/29/2
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
31
reference_url http://www.securitytracker.com/id?1020969
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020969
32
reference_url http://www.ubuntu.com/usn/usn-659-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-659-1
33
reference_url http://www.vupen.com/english/advisories/2008/2511
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2511
34
reference_url http://www.vupen.com/english/advisories/2008/2714
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2714
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=460401
reference_id 460401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=460401
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3525
reference_id CVE-2008-3525
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3525
38
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
39
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
40
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
41
reference_url https://usn.ubuntu.com/659-1/
reference_id USN-659-1
reference_type
scores
url https://usn.ubuntu.com/659-1/
fixed_packages
aliases CVE-2008-3525
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mn7v-1n4p-z3f2
11
url VCID-q7rz-jbh9-3qef
vulnerability_id VCID-q7rz-jbh9-3qef
summary kernel: Local DoS with corrupted ELF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4538
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24994
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.25034
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24806
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24875
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24935
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24896
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24842
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24853
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24847
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24825
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24768
published_at 2026-04-24T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24757
published_at 2026-04-26T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24712
published_at 2026-04-29T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24587
published_at 2026-05-05T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24664
published_at 2026-05-07T12:55:00Z
17
value 0.00086
scoring_system epss
scoring_elements 0.24727
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4538
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=289151
reference_id 289151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=289151
3
reference_url https://access.redhat.com/errata/RHSA-2007:0014
reference_id RHSA-2007:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0014
4
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
5
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
6
reference_url https://usn.ubuntu.com/347-1/
reference_id USN-347-1
reference_type
scores
url https://usn.ubuntu.com/347-1/
fixed_packages
aliases CVE-2006-4538
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7rz-jbh9-3qef
12
url VCID-syk6-6hck-hka9
vulnerability_id VCID-syk6-6hck-hka9
summary kernel: Missing ioctl() permission checks in aacraid driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4308
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24143
published_at 2026-04-01T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24272
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2409
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24156
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24201
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24178
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24121
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24136
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24099
published_at 2026-04-21T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23974
published_at 2026-04-24T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23961
published_at 2026-04-26T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.23921
published_at 2026-04-29T12:55:00Z
15
value 0.00082
scoring_system epss
scoring_elements 0.23809
published_at 2026-05-05T12:55:00Z
16
value 0.00082
scoring_system epss
scoring_elements 0.2389
published_at 2026-05-07T12:55:00Z
17
value 0.00082
scoring_system epss
scoring_elements 0.2396
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4308
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=252309
reference_id 252309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=252309
3
reference_url https://access.redhat.com/errata/RHSA-2007:0939
reference_id RHSA-2007:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0939
4
reference_url https://access.redhat.com/errata/RHSA-2007:0940
reference_id RHSA-2007:0940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0940
5
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/508-1/
reference_id USN-508-1
reference_type
scores
url https://usn.ubuntu.com/508-1/
9
reference_url https://usn.ubuntu.com/509-1/
reference_id USN-509-1
reference_type
scores
url https://usn.ubuntu.com/509-1/
10
reference_url https://usn.ubuntu.com/510-1/
reference_id USN-510-1
reference_type
scores
url https://usn.ubuntu.com/510-1/
fixed_packages
aliases CVE-2007-4308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syk6-6hck-hka9
Fixing_vulnerabilities
Risk_score8.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.18-e%3Farch=67