Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.4.21-58?arch=EL
Typerpm
Namespaceredhat
Namekernel
Version2.4.21-58
Qualifiers
arch EL
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-5p3h-bsad-fydk
vulnerability_id VCID-5p3h-bsad-fydk
summary kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=2a739dd53ad7ee010ae6e155438507f329dce788
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=2a739dd53ad7ee010ae6e155438507f329dce788
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2812.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2812.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2812
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.2674
published_at 2026-05-14T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.26657
published_at 2026-05-12T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27036
published_at 2026-04-01T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27076
published_at 2026-04-02T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27113
published_at 2026-04-04T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26902
published_at 2026-04-07T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26971
published_at 2026-04-08T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27016
published_at 2026-04-09T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27019
published_at 2026-04-11T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26975
published_at 2026-04-12T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26918
published_at 2026-04-13T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-16T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26903
published_at 2026-04-18T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26867
published_at 2026-04-21T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26818
published_at 2026-04-24T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26811
published_at 2026-04-26T12:55:00Z
16
value 0.00098
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-29T12:55:00Z
17
value 0.00098
scoring_system epss
scoring_elements 0.26599
published_at 2026-05-05T12:55:00Z
18
value 0.00098
scoring_system epss
scoring_elements 0.26667
published_at 2026-05-07T12:55:00Z
19
value 0.00098
scoring_system epss
scoring_elements 0.26716
published_at 2026-05-09T12:55:00Z
20
value 0.00098
scoring_system epss
scoring_elements 0.26639
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2812
11
reference_url http://secunia.com/advisories/30982
reference_id
reference_type
scores
url http://secunia.com/advisories/30982
12
reference_url http://secunia.com/advisories/31048
reference_id
reference_type
scores
url http://secunia.com/advisories/31048
13
reference_url http://secunia.com/advisories/31202
reference_id
reference_type
scores
url http://secunia.com/advisories/31202
14
reference_url http://secunia.com/advisories/31229
reference_id
reference_type
scores
url http://secunia.com/advisories/31229
15
reference_url http://secunia.com/advisories/31341
reference_id
reference_type
scores
url http://secunia.com/advisories/31341
16
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
17
reference_url http://secunia.com/advisories/31614
reference_id
reference_type
scores
url http://secunia.com/advisories/31614
18
reference_url http://secunia.com/advisories/31685
reference_id
reference_type
scores
url http://secunia.com/advisories/31685
19
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
20
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
21
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
22
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
23
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43687
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43687
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11632
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11632
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6633
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6633
26
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-365.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-365.htm
27
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
28
reference_url http://www.openwall.com/lists/oss-security/2008/07/03/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/03/2
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0612.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0612.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0665.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0665.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
32
reference_url http://www.securityfocus.com/bid/30076
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30076
33
reference_url http://www.vupen.com/english/advisories/2008/2063/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2063/references
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453419
reference_id 453419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453419
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:communication_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:communication_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:communication_manager:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:expanded_meet-me_conferencing:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:expanded_meet-me_conferencing:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:expanded_meet-me_conferencing:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:intuity_audix_lx:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:intuity_audix_lx:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:intuity_audix_lx:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:meeting_exchange:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:meeting_exchange:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:meeting_exchange:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:proactive_contact:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:proactive_contact:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:proactive_contact:4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:sip_enablement_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:sip_enablement_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:sip_enablement_services:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2812
reference_id CVE-2008-2812
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2008-2812
58
reference_url https://access.redhat.com/errata/RHSA-2008:0612
reference_id RHSA-2008:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0612
59
reference_url https://access.redhat.com/errata/RHSA-2008:0665
reference_id RHSA-2008:0665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0665
60
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
61
reference_url https://usn.ubuntu.com/637-1/
reference_id USN-637-1
reference_type
scores
url https://usn.ubuntu.com/637-1/
fixed_packages
aliases CVE-2008-2812
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5p3h-bsad-fydk
1
url VCID-9epb-x1za-vyed
vulnerability_id VCID-9epb-x1za-vyed
summary Linux Kernel isdn_net_setcfg buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6063
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36472
published_at 2026-04-01T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36647
published_at 2026-04-02T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36679
published_at 2026-04-04T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36517
published_at 2026-04-07T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36569
published_at 2026-04-08T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36588
published_at 2026-04-09T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36594
published_at 2026-04-11T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36559
published_at 2026-04-12T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36535
published_at 2026-04-13T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36579
published_at 2026-04-16T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36562
published_at 2026-04-18T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36506
published_at 2026-04-21T12:55:00Z
12
value 0.00157
scoring_system epss
scoring_elements 0.36277
published_at 2026-04-24T12:55:00Z
13
value 0.00157
scoring_system epss
scoring_elements 0.36246
published_at 2026-04-26T12:55:00Z
14
value 0.00157
scoring_system epss
scoring_elements 0.3616
published_at 2026-04-29T12:55:00Z
15
value 0.00157
scoring_system epss
scoring_elements 0.36043
published_at 2026-05-05T12:55:00Z
16
value 0.00157
scoring_system epss
scoring_elements 0.36111
published_at 2026-05-07T12:55:00Z
17
value 0.00157
scoring_system epss
scoring_elements 0.36138
published_at 2026-05-09T12:55:00Z
18
value 0.00157
scoring_system epss
scoring_elements 0.36049
published_at 2026-05-11T12:55:00Z
19
value 0.00157
scoring_system epss
scoring_elements 0.36071
published_at 2026-05-12T12:55:00Z
20
value 0.00157
scoring_system epss
scoring_elements 0.36142
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6063
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392101
reference_id 392101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392101
3
reference_url https://access.redhat.com/errata/RHSA-2008:0055
reference_id RHSA-2008:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0055
4
reference_url https://access.redhat.com/errata/RHSA-2008:0154
reference_id RHSA-2008:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0154
5
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
6
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
9
reference_url https://usn.ubuntu.com/578-1/
reference_id USN-578-1
reference_type
scores
url https://usn.ubuntu.com/578-1/
fixed_packages
aliases CVE-2007-6063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9epb-x1za-vyed
2
url VCID-cf2v-zn7q-b3gd
vulnerability_id VCID-cf2v-zn7q-b3gd
summary Linux kernel local filesystem DoS
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
4
reference_url http://lkml.org/lkml/2008/7/2/83
reference_id
reference_type
scores
url http://lkml.org/lkml/2008/7/2/83
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3275
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22889
published_at 2026-05-14T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22811
published_at 2026-05-12T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.22927
published_at 2026-04-01T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23094
published_at 2026-04-02T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23138
published_at 2026-04-04T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22929
published_at 2026-04-07T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23003
published_at 2026-04-08T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23055
published_at 2026-04-09T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23075
published_at 2026-04-11T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-12T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22982
published_at 2026-04-13T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22996
published_at 2026-04-16T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22988
published_at 2026-04-18T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.22951
published_at 2026-04-21T12:55:00Z
14
value 0.00077
scoring_system epss
scoring_elements 0.22782
published_at 2026-04-24T12:55:00Z
15
value 0.00077
scoring_system epss
scoring_elements 0.22776
published_at 2026-04-26T12:55:00Z
16
value 0.00077
scoring_system epss
scoring_elements 0.2277
published_at 2026-04-29T12:55:00Z
17
value 0.00077
scoring_system epss
scoring_elements 0.22671
published_at 2026-05-05T12:55:00Z
18
value 0.00077
scoring_system epss
scoring_elements 0.22756
published_at 2026-05-07T12:55:00Z
19
value 0.00077
scoring_system epss
scoring_elements 0.22832
published_at 2026-05-09T12:55:00Z
20
value 0.00077
scoring_system epss
scoring_elements 0.22797
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3275
7
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
8
reference_url http://secunia.com/advisories/31614
reference_id
reference_type
scores
url http://secunia.com/advisories/31614
9
reference_url http://secunia.com/advisories/31836
reference_id
reference_type
scores
url http://secunia.com/advisories/31836
10
reference_url http://secunia.com/advisories/31881
reference_id
reference_type
scores
url http://secunia.com/advisories/31881
11
reference_url http://secunia.com/advisories/32023
reference_id
reference_type
scores
url http://secunia.com/advisories/32023
12
reference_url http://secunia.com/advisories/32104
reference_id
reference_type
scores
url http://secunia.com/advisories/32104
13
reference_url http://secunia.com/advisories/32190
reference_id
reference_type
scores
url http://secunia.com/advisories/32190
14
reference_url http://secunia.com/advisories/32344
reference_id
reference_type
scores
url http://secunia.com/advisories/32344
15
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
16
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
17
reference_url http://secunia.com/advisories/33556
reference_id
reference_type
scores
url http://secunia.com/advisories/33556
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44410
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44410
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551
21
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
22
reference_url http://www.debian.org/security/2008/dsa-1636
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1636
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
24
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2008-0857.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0857.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2008-0885.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0885.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2009-0014.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0014.html
29
reference_url http://www.securityfocus.com/bid/30647
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30647
30
reference_url http://www.securitytracker.com/id?1020739
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020739
31
reference_url http://www.vupen.com/english/advisories/2008/2430
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2430
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457858
reference_id 457858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457858
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3275
reference_id CVE-2008-3275
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2008-3275
42
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
43
reference_url https://access.redhat.com/errata/RHSA-2008:0857
reference_id RHSA-2008:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0857
44
reference_url https://access.redhat.com/errata/RHSA-2008:0885
reference_id RHSA-2008:0885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0885
45
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
46
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
47
reference_url https://access.redhat.com/errata/RHSA-2009:0014
reference_id RHSA-2009:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0014
48
reference_url https://usn.ubuntu.com/637-1/
reference_id USN-637-1
reference_type
scores
url https://usn.ubuntu.com/637-1/
fixed_packages
aliases CVE-2008-3275
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2v-zn7q-b3gd
3
url VCID-cgyh-3yan-aycc
vulnerability_id VCID-cgyh-3yan-aycc
summary kernel: linux x86_64 ia32 emulation leaks uninitialized data
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2008-0508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0508.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0598.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0598.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0598
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22894
published_at 2026-05-14T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22931
published_at 2026-04-01T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23098
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23142
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22933
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23007
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23059
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23079
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23043
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22986
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23
published_at 2026-04-16T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22992
published_at 2026-04-18T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22955
published_at 2026-04-21T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.22786
published_at 2026-04-24T12:55:00Z
14
value 0.00077
scoring_system epss
scoring_elements 0.22781
published_at 2026-04-26T12:55:00Z
15
value 0.00077
scoring_system epss
scoring_elements 0.22775
published_at 2026-04-29T12:55:00Z
16
value 0.00077
scoring_system epss
scoring_elements 0.22676
published_at 2026-05-05T12:55:00Z
17
value 0.00077
scoring_system epss
scoring_elements 0.22761
published_at 2026-05-07T12:55:00Z
18
value 0.00077
scoring_system epss
scoring_elements 0.22837
published_at 2026-05-09T12:55:00Z
19
value 0.00077
scoring_system epss
scoring_elements 0.22802
published_at 2026-05-11T12:55:00Z
20
value 0.00077
scoring_system epss
scoring_elements 0.22816
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0598
6
reference_url http://secunia.com/advisories/30849
reference_id
reference_type
scores
url http://secunia.com/advisories/30849
7
reference_url http://secunia.com/advisories/30850
reference_id
reference_type
scores
url http://secunia.com/advisories/30850
8
reference_url http://secunia.com/advisories/31107
reference_id
reference_type
scores
url http://secunia.com/advisories/31107
9
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
10
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
11
reference_url http://secunia.com/advisories/32104
reference_id
reference_type
scores
url http://secunia.com/advisories/32104
12
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
13
reference_url http://secunia.com/advisories/33586
reference_id
reference_type
scores
url http://secunia.com/advisories/33586
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43554
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43554
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201
17
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-0519.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0519.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2009-0009.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0009.html
22
reference_url http://www.securityfocus.com/bid/29942
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29942
23
reference_url http://www.securitytracker.com/id?1020367
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020367
24
reference_url http://www.ubuntu.com/usn/usn-625-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-625-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=433938
reference_id 433938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=433938
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-0598
reference_id CVE-2008-0598
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-0598
29
reference_url https://access.redhat.com/errata/RHSA-2008:0508
reference_id RHSA-2008:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0508
30
reference_url https://access.redhat.com/errata/RHSA-2008:0519
reference_id RHSA-2008:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0519
31
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
32
reference_url https://access.redhat.com/errata/RHSA-2009:0009
reference_id RHSA-2009:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0009
33
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-0598
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgyh-3yan-aycc
4
url VCID-e1fa-s8q2-3fbv
vulnerability_id VCID-e1fa-s8q2-3fbv
summary kernel: sit memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
reference_id
reference_type
scores
0
value 0.23487
scoring_system epss
scoring_elements 0.95938
published_at 2026-04-01T12:55:00Z
1
value 0.23487
scoring_system epss
scoring_elements 0.95946
published_at 2026-04-02T12:55:00Z
2
value 0.23487
scoring_system epss
scoring_elements 0.95953
published_at 2026-04-04T12:55:00Z
3
value 0.23487
scoring_system epss
scoring_elements 0.95958
published_at 2026-04-07T12:55:00Z
4
value 0.23487
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-08T12:55:00Z
5
value 0.23487
scoring_system epss
scoring_elements 0.9597
published_at 2026-04-09T12:55:00Z
6
value 0.23487
scoring_system epss
scoring_elements 0.95974
published_at 2026-04-12T12:55:00Z
7
value 0.23487
scoring_system epss
scoring_elements 0.95976
published_at 2026-04-13T12:55:00Z
8
value 0.23487
scoring_system epss
scoring_elements 0.95986
published_at 2026-04-16T12:55:00Z
9
value 0.23487
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-18T12:55:00Z
10
value 0.23487
scoring_system epss
scoring_elements 0.95992
published_at 2026-04-29T12:55:00Z
11
value 0.23487
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-26T12:55:00Z
12
value 0.23487
scoring_system epss
scoring_elements 0.96002
published_at 2026-05-05T12:55:00Z
13
value 0.23487
scoring_system epss
scoring_elements 0.96006
published_at 2026-05-07T12:55:00Z
14
value 0.23487
scoring_system epss
scoring_elements 0.96009
published_at 2026-05-09T12:55:00Z
15
value 0.23487
scoring_system epss
scoring_elements 0.96013
published_at 2026-05-11T12:55:00Z
16
value 0.23487
scoring_system epss
scoring_elements 0.96018
published_at 2026-05-12T12:55:00Z
17
value 0.23487
scoring_system epss
scoring_elements 0.9603
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=446031
reference_id 446031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=446031
3
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
4
reference_url https://access.redhat.com/errata/RHSA-2008:0607
reference_id RHSA-2008:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0607
5
reference_url https://access.redhat.com/errata/RHSA-2008:0612
reference_id RHSA-2008:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0612
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
8
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
9
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2136
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv
5
url VCID-hjz4-81cy-w7az
vulnerability_id VCID-hjz4-81cy-w7az
summary kernel: open() call allows setgid bit when user is not in new file's group
references
0
reference_url http://bugzilla.kernel.org/show_bug.cgi?id=8420
reference_id
reference_type
scores
url http://bugzilla.kernel.org/show_bug.cgi?id=8420
1
reference_url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=7b82dc0e64e93f430182f36b46b79fcee87d3532
2
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2008-0972.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0972.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4210.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
reference_id
reference_type
scores
0
value 0.113
scoring_system epss
scoring_elements 0.93613
published_at 2026-05-14T12:55:00Z
1
value 0.113
scoring_system epss
scoring_elements 0.93494
published_at 2026-04-01T12:55:00Z
2
value 0.113
scoring_system epss
scoring_elements 0.93503
published_at 2026-04-02T12:55:00Z
3
value 0.113
scoring_system epss
scoring_elements 0.93511
published_at 2026-04-07T12:55:00Z
4
value 0.113
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-08T12:55:00Z
5
value 0.113
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-09T12:55:00Z
6
value 0.113
scoring_system epss
scoring_elements 0.93527
published_at 2026-04-13T12:55:00Z
7
value 0.113
scoring_system epss
scoring_elements 0.93546
published_at 2026-04-16T12:55:00Z
8
value 0.113
scoring_system epss
scoring_elements 0.93552
published_at 2026-04-18T12:55:00Z
9
value 0.113
scoring_system epss
scoring_elements 0.93559
published_at 2026-04-21T12:55:00Z
10
value 0.113
scoring_system epss
scoring_elements 0.93564
published_at 2026-04-24T12:55:00Z
11
value 0.113
scoring_system epss
scoring_elements 0.93563
published_at 2026-04-26T12:55:00Z
12
value 0.113
scoring_system epss
scoring_elements 0.93561
published_at 2026-04-29T12:55:00Z
13
value 0.113
scoring_system epss
scoring_elements 0.93569
published_at 2026-05-05T12:55:00Z
14
value 0.113
scoring_system epss
scoring_elements 0.93583
published_at 2026-05-07T12:55:00Z
15
value 0.113
scoring_system epss
scoring_elements 0.93594
published_at 2026-05-11T12:55:00Z
16
value 0.113
scoring_system epss
scoring_elements 0.936
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4210
10
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
11
reference_url http://secunia.com/advisories/32344
reference_id
reference_type
scores
url http://secunia.com/advisories/32344
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32485
reference_id
reference_type
scores
url http://secunia.com/advisories/32485
14
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
15
reference_url http://secunia.com/advisories/32799
reference_id
reference_type
scores
url http://secunia.com/advisories/32799
16
reference_url http://secunia.com/advisories/32918
reference_id
reference_type
scores
url http://secunia.com/advisories/32918
17
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
18
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
22
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
23
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
25
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/5
26
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/8
27
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2008-0957.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0957.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
30
reference_url http://www.securityfocus.com/bid/31368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31368
31
reference_url http://www.ubuntu.com/usn/usn-679-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-679-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463661
reference_id 463661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463661
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
reference_id CVE-2008-4210
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4210
64
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
reference_id OSVDB-49081;CVE-2008-4210
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6851.c
65
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
66
reference_url https://access.redhat.com/errata/RHSA-2008:0957
reference_id RHSA-2008:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0957
67
reference_url https://access.redhat.com/errata/RHSA-2008:0972
reference_id RHSA-2008:0972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0972
68
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
69
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
70
reference_url https://usn.ubuntu.com/679-1/
reference_id USN-679-1
reference_type
scores
url https://usn.ubuntu.com/679-1/
fixed_packages
aliases CVE-2008-4210
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjz4-81cy-w7az
6
url VCID-mn7v-1n4p-z3f2
vulnerability_id VCID-mn7v-1n4p-z3f2
summary kernel: missing capability checks in sbni_ioctl()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2455eb176ac87081bbfc9a44b21c7cd2bc1967e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3525.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3525
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19127
published_at 2026-05-14T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19208
published_at 2026-04-01T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19343
published_at 2026-04-02T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19395
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19112
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19191
published_at 2026-04-08T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19244
published_at 2026-04-09T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.1925
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19203
published_at 2026-04-12T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19148
published_at 2026-04-13T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19108
published_at 2026-04-16T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-18T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-21T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.19018
published_at 2026-04-24T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.19006
published_at 2026-04-26T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.18963
published_at 2026-04-29T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.18841
published_at 2026-05-05T12:55:00Z
17
value 0.00061
scoring_system epss
scoring_elements 0.18925
published_at 2026-05-07T12:55:00Z
18
value 0.00061
scoring_system epss
scoring_elements 0.19026
published_at 2026-05-09T12:55:00Z
19
value 0.00061
scoring_system epss
scoring_elements 0.18989
published_at 2026-05-11T12:55:00Z
20
value 0.00061
scoring_system epss
scoring_elements 0.19024
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3525
9
reference_url http://secunia.com/advisories/32103
reference_id
reference_type
scores
url http://secunia.com/advisories/32103
10
reference_url http://secunia.com/advisories/32237
reference_id
reference_type
scores
url http://secunia.com/advisories/32237
11
reference_url http://secunia.com/advisories/32315
reference_id
reference_type
scores
url http://secunia.com/advisories/32315
12
reference_url http://secunia.com/advisories/32356
reference_id
reference_type
scores
url http://secunia.com/advisories/32356
13
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
14
reference_url http://secunia.com/advisories/32386
reference_id
reference_type
scores
url http://secunia.com/advisories/32386
15
reference_url http://secunia.com/advisories/32393
reference_id
reference_type
scores
url http://secunia.com/advisories/32393
16
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
17
reference_url http://secunia.com/advisories/33201
reference_id
reference_type
scores
url http://secunia.com/advisories/33201
18
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5671
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9364
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html
23
reference_url http://www.debian.org/security/2008/dsa-1653
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1653
24
reference_url http://www.debian.org/security/2008/dsa-1655
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1655
25
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:223
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:223
28
reference_url http://www.openwall.com/lists/oss-security/2008/08/29/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/29/2
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0973.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0973.html
31
reference_url http://www.securitytracker.com/id?1020969
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020969
32
reference_url http://www.ubuntu.com/usn/usn-659-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-659-1
33
reference_url http://www.vupen.com/english/advisories/2008/2511
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2511
34
reference_url http://www.vupen.com/english/advisories/2008/2714
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2714
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=460401
reference_id 460401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=460401
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3525
reference_id CVE-2008-3525
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3525
38
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
39
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
40
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
41
reference_url https://usn.ubuntu.com/659-1/
reference_id USN-659-1
reference_type
scores
url https://usn.ubuntu.com/659-1/
fixed_packages
aliases CVE-2008-3525
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mn7v-1n4p-z3f2
Fixing_vulnerabilities
Risk_score8.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-58%3Farch=EL