{"url":"http://public2.vulnerablecode.io/api/packages/128909?format=json","purl":"pkg:rpm/redhat/kernel@2.4.18-e?arch=67","type":"rpm","namespace":"redhat","name":"kernel","version":"2.4.18-e","qualifiers":{"arch":"67"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88525?format=json","vulnerability_id":"VCID-6a1a-z32k-3bec","summary":"kernel: insufficient range checks in fault handlers with mremap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28405","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28463","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28485","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28407","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28428","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28502","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961","reference_id":"428961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0007"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6a1a-z32k-3bec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88732?format=json","vulnerability_id":"VCID-8zkt-6zb3-c3gx","summary":"fib_semantics.c out of bounds access vulnerability","references":[{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21678","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21606","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21582","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21605","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172"},{"reference_url":"http://secunia.com/advisories/25068","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25068"},{"reference_url":"http://secunia.com/advisories/25288","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25288"},{"reference_url":"http://secunia.com/advisories/25392","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25392"},{"reference_url":"http://secunia.com/advisories/25838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25838"},{"reference_url":"http://secunia.com/advisories/26289","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26289"},{"reference_url":"http://secunia.com/advisories/26450","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26450"},{"reference_url":"http://secunia.com/advisories/26620","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26620"},{"reference_url":"http://secunia.com/advisories/26647","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26647"},{"reference_url":"http://secunia.com/advisories/27913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27913"},{"reference_url":"http://secunia.com/advisories/29058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29058"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1356","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1356"},{"reference_url":"http://www.debian.org/security/2007/dsa-1363","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1363"},{"reference_url":"http://www.debian.org/security/2008/dsa-1503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1503"},{"reference_url":"http://www.debian.org/security/2008/dsa-1504","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1504"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.securityfocus.com/bid/23447","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23447"},{"reference_url":"http://www.ubuntu.com/usn/usn-464-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-464-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2690","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429","reference_id":"250429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172","reference_id":"CVE-2007-2172","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0347","reference_id":"RHSA-2007:0347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0488","reference_id":"RHSA-2007:0488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/464-1/","reference_id":"USN-464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/464-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2172"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88584?format=json","vulnerability_id":"VCID-9epb-x1za-vyed","summary":"Linux Kernel isdn_net_setcfg buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6063","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36679","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36579","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36562","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36506","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36277","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36043","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36111","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36138","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36049","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36071","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36142","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6063"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392101","reference_id":"392101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0154","reference_id":"RHSA-2008:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0973","reference_id":"RHSA-2008:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6063"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9epb-x1za-vyed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88421?format=json","vulnerability_id":"VCID-cf2v-zn7q-b3gd","summary":"Linux kernel local filesystem DoS","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77"},{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"},{"reference_url":"http://lkml.org/lkml/2008/7/2/83","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2008/7/2/83"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3275","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22889","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22996","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22782","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22671","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22756","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22797","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3275"},{"reference_url":"http://secunia.com/advisories/31551","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31551"},{"reference_url":"http://secunia.com/advisories/31614","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31614"},{"reference_url":"http://secunia.com/advisories/31836","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31836"},{"reference_url":"http://secunia.com/advisories/31881","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31881"},{"reference_url":"http://secunia.com/advisories/32023","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32023"},{"reference_url":"http://secunia.com/advisories/32104","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32104"},{"reference_url":"http://secunia.com/advisories/32190","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32190"},{"reference_url":"http://secunia.com/advisories/32344","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32344"},{"reference_url":"http://secunia.com/advisories/33201","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33201"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"http://secunia.com/advisories/33556","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33556"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44410","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44410"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551"},{"reference_url":"http://www.debian.org/security/2008/dsa-1630","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1630"},{"reference_url":"http://www.debian.org/security/2008/dsa-1636","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1636"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0857.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0857.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0885.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0885.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0014.html"},{"reference_url":"http://www.securityfocus.com/bid/30647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30647"},{"reference_url":"http://www.securitytracker.com/id?1020739","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020739"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2430","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2430"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=457858","reference_id":"457858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=457858"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3275","reference_id":"CVE-2008-3275","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0857","reference_id":"RHSA-2008:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0885","reference_id":"RHSA-2008:0885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0973","reference_id":"RHSA-2008:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0014","reference_id":"RHSA-2009:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0014"},{"reference_url":"https://usn.ubuntu.com/637-1/","reference_id":"USN-637-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/637-1/"}],"fixed_packages":[],"aliases":["CVE-2008-3275"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2v-zn7q-b3gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88570?format=json","vulnerability_id":"VCID-d3j2-c5ey-pqbe","summary":"I4L: fix isdn_ioctl memory issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6151","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1826","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18144","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18005","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18094","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18196","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18164","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18192","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18283","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=425111","reference_id":"425111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=425111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6151"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3j2-c5ey-pqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88785?format=json","vulnerability_id":"VCID-d91v-h4jm-bffj","summary":"kernel Race condition in mincore can cause \"ps -ef\" to hang","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2008/000023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2008/000023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0014.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4814","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25478","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25334","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25401","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25384","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4814"},{"reference_url":"http://secunia.com/advisories/23436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23436"},{"reference_url":"http://secunia.com/advisories/23609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23609"},{"reference_url":"http://secunia.com/advisories/23997","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23997"},{"reference_url":"http://secunia.com/advisories/24098","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24098"},{"reference_url":"http://secunia.com/advisories/24100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24100"},{"reference_url":"http://secunia.com/advisories/24206","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24206"},{"reference_url":"http://secunia.com/advisories/24482","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24482"},{"reference_url":"http://secunia.com/advisories/25691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25691"},{"reference_url":"http://secunia.com/advisories/25714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25714"},{"reference_url":"http://secunia.com/advisories/29058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29058"},{"reference_url":"http://secunia.com/advisories/30110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30110"},{"reference_url":"http://secunia.com/advisories/31246","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31246"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1304","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1304"},{"reference_url":"http://www.debian.org/security/2008/dsa-1503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1503"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0211.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0211.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.securityfocus.com/archive/1/471457","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471457"},{"reference_url":"http://www.securityfocus.com/bid/21663","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21663"},{"reference_url":"http://www.trustix.org/errata/2007/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0002/"},{"reference_url":"http://www.ubuntu.com/usn/usn-416-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-416-1"},{"reference_url":"http://www.vupen.com/english/advisories/2006/5082","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/5082"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2222/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2222/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=306971","reference_id":"306971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=306971"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4814","reference_id":"CVE-2006-4814","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0014","reference_id":"RHSA-2007:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/416-1/","reference_id":"USN-416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/416-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4814"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d91v-h4jm-bffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88660?format=json","vulnerability_id":"VCID-dajb-npd8-6bhn","summary":"Privilege escalation via PR_SET_PDEATHSIG","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3848","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24713","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24781","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24748","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24726","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24653","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24486","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24564","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24555","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24572","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250972","reference_id":"250972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0939","reference_id":"RHSA-2007:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0940","reference_id":"RHSA-2007:0940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/508-1/","reference_id":"USN-508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/508-1/"},{"reference_url":"https://usn.ubuntu.com/509-1/","reference_id":"USN-509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/509-1/"},{"reference_url":"https://usn.ubuntu.com/510-1/","reference_id":"USN-510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/510-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3848"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dajb-npd8-6bhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89464?format=json","vulnerability_id":"VCID-dk79-tsxh-jqfa","summary":"Issue with core dump owner","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17538","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17347","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17536","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17715","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17617","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22696","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861","reference_id":"396861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6206"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dk79-tsxh-jqfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88462?format=json","vulnerability_id":"VCID-e1fa-s8q2-3fbv","summary":"kernel: sit memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2136","reference_id":"","reference_type":"","scores":[{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95967","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.9597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.95993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.96002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.96006","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.96009","published_at":"2026-05-09T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.96013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.96018","published_at":"2026-05-12T12:55:00Z"},{"value":"0.23487","scoring_system":"epss","scoring_elements":"0.9603","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2136"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=446031","reference_id":"446031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=446031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0585","reference_id":"RHSA-2008:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0607","reference_id":"RHSA-2008:0607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0612","reference_id":"RHSA-2008:0612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0973","reference_id":"RHSA-2008:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/625-1/","reference_id":"USN-625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/625-1/"}],"fixed_packages":[],"aliases":["CVE-2008-2136"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88710?format=json","vulnerability_id":"VCID-hjz4-81cy-w7az","summary":"kernel: open() call allows setgid bit when user is not in new file's group","references":[{"reference_url":"http://bugzilla.kernel.org/show_bug.cgi?id=8420","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.kernel.org/show_bug.cgi?id=8420"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532"},{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0972.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0972.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4210","reference_id":"","reference_type":"","scores":[{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93613","published_at":"2026-05-14T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93527","published_at":"2026-04-13T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93559","published_at":"2026-04-21T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93564","published_at":"2026-04-24T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93569","published_at":"2026-05-05T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.93594","published_at":"2026-05-11T12:55:00Z"},{"value":"0.113","scoring_system":"epss","scoring_elements":"0.936","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4210"},{"reference_url":"http://secunia.com/advisories/32237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32237"},{"reference_url":"http://secunia.com/advisories/32344","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32344"},{"reference_url":"http://secunia.com/advisories/32356","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32356"},{"reference_url":"http://secunia.com/advisories/32485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32485"},{"reference_url":"http://secunia.com/advisories/32759","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32759"},{"reference_url":"http://secunia.com/advisories/32799","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32799"},{"reference_url":"http://secunia.com/advisories/32918","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32918"},{"reference_url":"http://secunia.com/advisories/33201","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33201"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45539","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45539"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511"},{"reference_url":"http://www.debian.org/security/2008/dsa-1653","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1653"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/09/24/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/09/24/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/09/24/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/09/24/8"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0957.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0957.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html"},{"reference_url":"http://www.securityfocus.com/bid/31368","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31368"},{"reference_url":"http://www.ubuntu.com/usn/usn-679-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-679-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463661","reference_id":"463661","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463661"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4210","reference_id":"CVE-2008-4210","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4210"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c","reference_id":"OSVDB-49081;CVE-2008-4210","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0957","reference_id":"RHSA-2008:0957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0972","reference_id":"RHSA-2008:0972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0973","reference_id":"RHSA-2008:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/679-1/","reference_id":"USN-679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/679-1/"}],"fixed_packages":[],"aliases":["CVE-2008-4210"],"risk_score":8.2,"exploitability":"2.0","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjz4-81cy-w7az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88359?format=json","vulnerability_id":"VCID-mn7v-1n4p-z3f2","summary":"kernel: missing capability checks in sbni_ioctl()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3525","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19127","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19395","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19006","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18925","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19026","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18989","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19024","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3525"},{"reference_url":"http://secunia.com/advisories/32103","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32103"},{"reference_url":"http://secunia.com/advisories/32237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32237"},{"reference_url":"http://secunia.com/advisories/32315","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32315"},{"reference_url":"http://secunia.com/advisories/32356","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32356"},{"reference_url":"http://secunia.com/advisories/32370","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32370"},{"reference_url":"http://secunia.com/advisories/32386","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32386"},{"reference_url":"http://secunia.com/advisories/32393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32393"},{"reference_url":"http://secunia.com/advisories/32759","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32759"},{"reference_url":"http://secunia.com/advisories/33201","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33201"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html"},{"reference_url":"http://www.debian.org/security/2008/dsa-1653","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1653"},{"reference_url":"http://www.debian.org/security/2008/dsa-1655","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1655"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:223","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:223"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/08/29/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/08/29/2"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0973.html"},{"reference_url":"http://www.securitytracker.com/id?1020969","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020969"},{"reference_url":"http://www.ubuntu.com/usn/usn-659-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-659-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2511","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2511"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2714","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2714"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=460401","reference_id":"460401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=460401"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3525","reference_id":"CVE-2008-3525","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3525"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0973","reference_id":"RHSA-2008:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/659-1/","reference_id":"USN-659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/659-1/"}],"fixed_packages":[],"aliases":["CVE-2008-3525"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mn7v-1n4p-z3f2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88828?format=json","vulnerability_id":"VCID-q7rz-jbh9-3qef","summary":"kernel: Local DoS with corrupted ELF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4538","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.25034","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24664","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24727","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24672","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24751","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4538"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=289151","reference_id":"289151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=289151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0014","reference_id":"RHSA-2007:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://usn.ubuntu.com/347-1/","reference_id":"USN-347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/347-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4538"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7rz-jbh9-3qef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88668?format=json","vulnerability_id":"VCID-syk6-6hck-hka9","summary":"kernel: Missing ioctl() permission checks in aacraid driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4308","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2389","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2396","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23922","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24011","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4308"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=252309","reference_id":"252309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=252309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0939","reference_id":"RHSA-2007:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0940","reference_id":"RHSA-2007:0940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/508-1/","reference_id":"USN-508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/508-1/"},{"reference_url":"https://usn.ubuntu.com/509-1/","reference_id":"USN-509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/509-1/"},{"reference_url":"https://usn.ubuntu.com/510-1/","reference_id":"USN-510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/510-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4308"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-syk6-6hck-hka9"}],"fixing_vulnerabilities":[],"risk_score":"8.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.18-e%3Farch=67"}