Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt
Typerpm
Namespaceredhat
Namekernel-rt
Version2.6.24.7-74
Qualifiers
arch el5rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2584-pd5b-9bf4
vulnerability_id VCID-2584-pd5b-9bf4
summary kernel: [x86_64] The string instruction version didn't zero the output on exception.
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff
1
reference_url http://rhn.redhat.com/errata/RHSA-2008-0508.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0508.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2729
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.1903
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19164
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19216
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19012
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-16T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24939
published_at 2026-04-18T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24912
published_at 2026-04-21T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24855
published_at 2026-04-24T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24842
published_at 2026-04-26T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24797
published_at 2026-04-29T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24673
published_at 2026-05-05T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24748
published_at 2026-05-07T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24813
published_at 2026-05-09T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24739
published_at 2026-05-11T12:55:00Z
15
value 0.00087
scoring_system epss
scoring_elements 0.24757
published_at 2026-05-12T12:55:00Z
16
value 0.00087
scoring_system epss
scoring_elements 0.24834
published_at 2026-05-14T12:55:00Z
17
value 0.00087
scoring_system epss
scoring_elements 0.25014
published_at 2026-04-09T12:55:00Z
18
value 0.00087
scoring_system epss
scoring_elements 0.25028
published_at 2026-04-11T12:55:00Z
19
value 0.00087
scoring_system epss
scoring_elements 0.24988
published_at 2026-04-12T12:55:00Z
20
value 0.00087
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2729
4
reference_url http://secunia.com/advisories/30849
reference_id
reference_type
scores
url http://secunia.com/advisories/30849
5
reference_url http://secunia.com/advisories/30850
reference_id
reference_type
scores
url http://secunia.com/advisories/30850
6
reference_url http://secunia.com/advisories/31107
reference_id
reference_type
scores
url http://secunia.com/advisories/31107
7
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
8
reference_url http://secunia.com/advisories/31628
reference_id
reference_type
scores
url http://secunia.com/advisories/31628
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43558
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43558
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571
11
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
13
reference_url http://www.redhat.com/support/errata/RHSA-2008-0519.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0519.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-0585.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0585.html
15
reference_url http://www.securityfocus.com/bid/29943
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29943
16
reference_url http://www.securitytracker.com/id?1020364
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020364
17
reference_url http://www.ubuntu.com/usn/usn-625-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-625-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=451271
reference_id 451271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=451271
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2729
reference_id CVE-2008-2729
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-2729
21
reference_url https://access.redhat.com/errata/RHSA-2008:0508
reference_id RHSA-2008:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0508
22
reference_url https://access.redhat.com/errata/RHSA-2008:0519
reference_id RHSA-2008:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0519
23
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
24
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2729
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2584-pd5b-9bf4
1
url VCID-7f3u-q7tk-h7ac
vulnerability_id VCID-7f3u-q7tk-h7ac
summary IPSec ESP kernel panics
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6282
reference_id
reference_type
scores
0
value 0.02449
scoring_system epss
scoring_elements 0.85127
published_at 2026-04-01T12:55:00Z
1
value 0.02449
scoring_system epss
scoring_elements 0.85139
published_at 2026-04-02T12:55:00Z
2
value 0.02449
scoring_system epss
scoring_elements 0.85156
published_at 2026-04-04T12:55:00Z
3
value 0.02449
scoring_system epss
scoring_elements 0.85158
published_at 2026-04-07T12:55:00Z
4
value 0.02449
scoring_system epss
scoring_elements 0.8518
published_at 2026-04-08T12:55:00Z
5
value 0.02449
scoring_system epss
scoring_elements 0.85188
published_at 2026-04-09T12:55:00Z
6
value 0.02449
scoring_system epss
scoring_elements 0.85203
published_at 2026-04-11T12:55:00Z
7
value 0.02449
scoring_system epss
scoring_elements 0.852
published_at 2026-04-12T12:55:00Z
8
value 0.02449
scoring_system epss
scoring_elements 0.85197
published_at 2026-04-13T12:55:00Z
9
value 0.02449
scoring_system epss
scoring_elements 0.85218
published_at 2026-04-21T12:55:00Z
10
value 0.02449
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-18T12:55:00Z
11
value 0.02449
scoring_system epss
scoring_elements 0.85242
published_at 2026-04-24T12:55:00Z
12
value 0.02449
scoring_system epss
scoring_elements 0.8525
published_at 2026-04-26T12:55:00Z
13
value 0.02449
scoring_system epss
scoring_elements 0.85248
published_at 2026-04-29T12:55:00Z
14
value 0.02449
scoring_system epss
scoring_elements 0.85262
published_at 2026-05-05T12:55:00Z
15
value 0.02449
scoring_system epss
scoring_elements 0.85289
published_at 2026-05-07T12:55:00Z
16
value 0.02449
scoring_system epss
scoring_elements 0.85307
published_at 2026-05-09T12:55:00Z
17
value 0.02449
scoring_system epss
scoring_elements 0.85302
published_at 2026-05-11T12:55:00Z
18
value 0.02449
scoring_system epss
scoring_elements 0.85316
published_at 2026-05-12T12:55:00Z
19
value 0.02449
scoring_system epss
scoring_elements 0.85353
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6282
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=404291
reference_id 404291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=404291
3
reference_url https://access.redhat.com/errata/RHSA-2008:0237
reference_id RHSA-2008:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0237
4
reference_url https://access.redhat.com/errata/RHSA-2008:0275
reference_id RHSA-2008:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0275
5
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
6
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2007-6282
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3u-q7tk-h7ac
2
url VCID-czdd-eft9-vyhj
vulnerability_id VCID-czdd-eft9-vyhj
summary kernel: infinite loop in highres timers (kernel hang)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6712
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13573
published_at 2026-04-01T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13673
published_at 2026-05-14T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13734
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13536
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13616
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13638
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13601
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13553
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13468
published_at 2026-04-16T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13463
published_at 2026-04-18T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13534
published_at 2026-04-21T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13544
published_at 2026-04-24T12:55:00Z
13
value 0.00044
scoring_system epss
scoring_elements 0.13517
published_at 2026-04-26T12:55:00Z
14
value 0.00044
scoring_system epss
scoring_elements 0.13409
published_at 2026-04-29T12:55:00Z
15
value 0.00044
scoring_system epss
scoring_elements 0.13313
published_at 2026-05-05T12:55:00Z
16
value 0.00044
scoring_system epss
scoring_elements 0.13472
published_at 2026-05-07T12:55:00Z
17
value 0.00044
scoring_system epss
scoring_elements 0.13556
published_at 2026-05-09T12:55:00Z
18
value 0.00044
scoring_system epss
scoring_elements 0.13548
published_at 2026-05-11T12:55:00Z
19
value 0.00044
scoring_system epss
scoring_elements 0.13578
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6712
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=439999
reference_id 439999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=439999
3
reference_url https://access.redhat.com/errata/RHSA-2008:0275
reference_id RHSA-2008:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0275
4
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
5
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2007-6712
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czdd-eft9-vyhj
3
url VCID-e1fa-s8q2-3fbv
vulnerability_id VCID-e1fa-s8q2-3fbv
summary kernel: sit memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
reference_id
reference_type
scores
0
value 0.23487
scoring_system epss
scoring_elements 0.95938
published_at 2026-04-01T12:55:00Z
1
value 0.23487
scoring_system epss
scoring_elements 0.95946
published_at 2026-04-02T12:55:00Z
2
value 0.23487
scoring_system epss
scoring_elements 0.95953
published_at 2026-04-04T12:55:00Z
3
value 0.23487
scoring_system epss
scoring_elements 0.95958
published_at 2026-04-07T12:55:00Z
4
value 0.23487
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-08T12:55:00Z
5
value 0.23487
scoring_system epss
scoring_elements 0.9597
published_at 2026-04-09T12:55:00Z
6
value 0.23487
scoring_system epss
scoring_elements 0.95974
published_at 2026-04-12T12:55:00Z
7
value 0.23487
scoring_system epss
scoring_elements 0.95976
published_at 2026-04-13T12:55:00Z
8
value 0.23487
scoring_system epss
scoring_elements 0.95986
published_at 2026-04-16T12:55:00Z
9
value 0.23487
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-18T12:55:00Z
10
value 0.23487
scoring_system epss
scoring_elements 0.95992
published_at 2026-04-29T12:55:00Z
11
value 0.23487
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-26T12:55:00Z
12
value 0.23487
scoring_system epss
scoring_elements 0.96002
published_at 2026-05-05T12:55:00Z
13
value 0.23487
scoring_system epss
scoring_elements 0.96006
published_at 2026-05-07T12:55:00Z
14
value 0.23487
scoring_system epss
scoring_elements 0.96009
published_at 2026-05-09T12:55:00Z
15
value 0.23487
scoring_system epss
scoring_elements 0.96013
published_at 2026-05-11T12:55:00Z
16
value 0.23487
scoring_system epss
scoring_elements 0.96018
published_at 2026-05-12T12:55:00Z
17
value 0.23487
scoring_system epss
scoring_elements 0.9603
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2136
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=446031
reference_id 446031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=446031
3
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
4
reference_url https://access.redhat.com/errata/RHSA-2008:0607
reference_id RHSA-2008:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0607
5
reference_url https://access.redhat.com/errata/RHSA-2008:0612
reference_id RHSA-2008:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0612
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2008:0973
reference_id RHSA-2008:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0973
8
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
9
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2136
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv
4
url VCID-g392-veug-qygm
vulnerability_id VCID-g392-veug-qygm
summary kernel: non-root can trigger cpu_idle soft lockup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5966
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-01T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-02T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-04T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25485
published_at 2026-04-07T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25558
published_at 2026-04-08T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25606
published_at 2026-04-09T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25616
published_at 2026-04-11T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25575
published_at 2026-04-12T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25518
published_at 2026-04-13T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25523
published_at 2026-04-16T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25507
published_at 2026-04-18T12:55:00Z
11
value 0.0009
scoring_system epss
scoring_elements 0.25476
published_at 2026-04-21T12:55:00Z
12
value 0.0009
scoring_system epss
scoring_elements 0.25434
published_at 2026-04-24T12:55:00Z
13
value 0.0009
scoring_system epss
scoring_elements 0.25425
published_at 2026-04-26T12:55:00Z
14
value 0.0009
scoring_system epss
scoring_elements 0.25378
published_at 2026-04-29T12:55:00Z
15
value 0.0009
scoring_system epss
scoring_elements 0.2526
published_at 2026-05-05T12:55:00Z
16
value 0.0009
scoring_system epss
scoring_elements 0.25328
published_at 2026-05-07T12:55:00Z
17
value 0.0009
scoring_system epss
scoring_elements 0.2539
published_at 2026-05-09T12:55:00Z
18
value 0.0009
scoring_system epss
scoring_elements 0.2531
published_at 2026-05-11T12:55:00Z
19
value 0.0009
scoring_system epss
scoring_elements 0.25327
published_at 2026-05-12T12:55:00Z
20
value 0.0009
scoring_system epss
scoring_elements 0.25402
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5966
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453135
reference_id 453135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453135
3
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
4
reference_url https://access.redhat.com/errata/RHSA-2009:1193
reference_id RHSA-2009:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1193
5
reference_url https://access.redhat.com/errata/RHSA-2010:0079
reference_id RHSA-2010:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0079
6
reference_url https://usn.ubuntu.com/574-1/
reference_id USN-574-1
reference_type
scores
url https://usn.ubuntu.com/574-1/
fixed_packages
aliases CVE-2007-5966
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g392-veug-qygm
5
url VCID-k8uq-hwcd-2fg8
vulnerability_id VCID-k8uq-hwcd-2fg8
summary kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
4
reference_url http://lwn.net/Articles/287350/
reference_id
reference_type
scores
url http://lwn.net/Articles/287350/
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2826
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.3537
published_at 2026-05-14T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35891
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35921
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35752
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35801
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35824
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35832
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35791
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35769
published_at 2026-04-13T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35808
published_at 2026-04-16T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-18T12:55:00Z
12
value 0.00151
scoring_system epss
scoring_elements 0.35748
published_at 2026-04-21T12:55:00Z
13
value 0.00151
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-24T12:55:00Z
14
value 0.00151
scoring_system epss
scoring_elements 0.35485
published_at 2026-04-26T12:55:00Z
15
value 0.00151
scoring_system epss
scoring_elements 0.35397
published_at 2026-04-29T12:55:00Z
16
value 0.00151
scoring_system epss
scoring_elements 0.3528
published_at 2026-05-05T12:55:00Z
17
value 0.00151
scoring_system epss
scoring_elements 0.35349
published_at 2026-05-07T12:55:00Z
18
value 0.00151
scoring_system epss
scoring_elements 0.35372
published_at 2026-05-09T12:55:00Z
19
value 0.00151
scoring_system epss
scoring_elements 0.35277
published_at 2026-05-11T12:55:00Z
20
value 0.00151
scoring_system epss
scoring_elements 0.353
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2826
7
reference_url http://secunia.com/advisories/30901
reference_id
reference_type
scores
url http://secunia.com/advisories/30901
8
reference_url http://secunia.com/advisories/31107
reference_id
reference_type
scores
url http://secunia.com/advisories/31107
9
reference_url http://secunia.com/advisories/31202
reference_id
reference_type
scores
url http://secunia.com/advisories/31202
10
reference_url http://secunia.com/advisories/31551
reference_id
reference_type
scores
url http://secunia.com/advisories/31551
11
reference_url http://secunia.com/advisories/31628
reference_id
reference_type
scores
url http://secunia.com/advisories/31628
12
reference_url http://secunia.com/advisories/32370
reference_id
reference_type
scores
url http://secunia.com/advisories/32370
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43559
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43559
14
reference_url https://issues.rpath.com/browse/RPL-2629
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2629
15
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
16
reference_url http://www.debian.org/security/2008/dsa-1630
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1630
17
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
20
reference_url http://www.redhat.com/support/errata/RHSA-2008-0585.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0585.html
21
reference_url http://www.securityfocus.com/bid/29990
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29990
22
reference_url http://www.securitytracker.com/id?1020514
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020514
23
reference_url http://www.ubuntu.com/usn/usn-625-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-625-1
24
reference_url http://www.vupen.com/english/advisories/2008/2511
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2511
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452478
reference_id 452478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452478
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2826
reference_id CVE-2008-2826
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2826
35
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
36
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2826
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8uq-hwcd-2fg8
6
url VCID-nkbj-56hz-vqfe
vulnerability_id VCID-nkbj-56hz-vqfe
summary kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1615
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19276
published_at 2026-04-01T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19411
published_at 2026-04-02T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.1946
published_at 2026-04-04T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-07T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19256
published_at 2026-04-08T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19308
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2999
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29944
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29895
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29892
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29847
published_at 2026-04-21T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.2977
published_at 2026-04-24T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29656
published_at 2026-04-26T12:55:00Z
14
value 0.00113
scoring_system epss
scoring_elements 0.29596
published_at 2026-04-29T12:55:00Z
15
value 0.00113
scoring_system epss
scoring_elements 0.29453
published_at 2026-05-05T12:55:00Z
16
value 0.00113
scoring_system epss
scoring_elements 0.29516
published_at 2026-05-07T12:55:00Z
17
value 0.00113
scoring_system epss
scoring_elements 0.29527
published_at 2026-05-09T12:55:00Z
18
value 0.00113
scoring_system epss
scoring_elements 0.29452
published_at 2026-05-11T12:55:00Z
19
value 0.00113
scoring_system epss
scoring_elements 0.29473
published_at 2026-05-12T12:55:00Z
20
value 0.00113
scoring_system epss
scoring_elements 0.29552
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1615
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431430
reference_id 431430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431430
3
reference_url https://access.redhat.com/errata/RHSA-2008:0237
reference_id RHSA-2008:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0237
4
reference_url https://access.redhat.com/errata/RHSA-2008:0275
reference_id RHSA-2008:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0275
5
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
6
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-1615
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkbj-56hz-vqfe
7
url VCID-q32m-2g35-uubv
vulnerability_id VCID-q32m-2g35-uubv
summary kernel: fix permission checking in sys_utimensat
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2148
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20143
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20291
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20349
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20073
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20212
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20132
published_at 2026-05-14T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20129
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20128
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20012
published_at 2026-04-24T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20007
published_at 2026-04-26T12:55:00Z
14
value 0.00065
scoring_system epss
scoring_elements 0.19977
published_at 2026-04-29T12:55:00Z
15
value 0.00065
scoring_system epss
scoring_elements 0.19884
published_at 2026-05-05T12:55:00Z
16
value 0.00065
scoring_system epss
scoring_elements 0.19962
published_at 2026-05-07T12:55:00Z
17
value 0.00065
scoring_system epss
scoring_elements 0.20048
published_at 2026-05-09T12:55:00Z
18
value 0.00065
scoring_system epss
scoring_elements 0.20018
published_at 2026-05-11T12:55:00Z
19
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2148
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=455275
reference_id 455275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=455275
3
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
4
reference_url https://usn.ubuntu.com/625-1/
reference_id USN-625-1
reference_type
scores
url https://usn.ubuntu.com/625-1/
fixed_packages
aliases CVE-2008-2148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q32m-2g35-uubv
8
url VCID-qv5k-g3b6-hfc2
vulnerability_id VCID-qv5k-g3b6-hfc2
summary kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
5
reference_url http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
reference_id
reference_type
scores
url http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2372
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14833
published_at 2026-05-14T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14737
published_at 2026-04-01T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14788
published_at 2026-04-02T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14865
published_at 2026-04-04T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14668
published_at 2026-04-07T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14758
published_at 2026-04-08T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-09T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14777
published_at 2026-04-11T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.1474
published_at 2026-04-12T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14684
published_at 2026-04-13T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14578
published_at 2026-04-16T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14585
published_at 2026-04-18T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14647
published_at 2026-04-21T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.14679
published_at 2026-04-24T12:55:00Z
14
value 0.00048
scoring_system epss
scoring_elements 0.14678
published_at 2026-04-26T12:55:00Z
15
value 0.00048
scoring_system epss
scoring_elements 0.14614
published_at 2026-04-29T12:55:00Z
16
value 0.00048
scoring_system epss
scoring_elements 0.14492
published_at 2026-05-05T12:55:00Z
17
value 0.00048
scoring_system epss
scoring_elements 0.14626
published_at 2026-05-07T12:55:00Z
18
value 0.00048
scoring_system epss
scoring_elements 0.14716
published_at 2026-05-09T12:55:00Z
19
value 0.00048
scoring_system epss
scoring_elements 0.14711
published_at 2026-05-11T12:55:00Z
20
value 0.00048
scoring_system epss
scoring_elements 0.14754
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2372
8
reference_url http://secunia.com/advisories/30901
reference_id
reference_type
scores
url http://secunia.com/advisories/30901
9
reference_url http://secunia.com/advisories/30982
reference_id
reference_type
scores
url http://secunia.com/advisories/30982
10
reference_url http://secunia.com/advisories/31202
reference_id
reference_type
scores
url http://secunia.com/advisories/31202
11
reference_url http://secunia.com/advisories/31628
reference_id
reference_type
scores
url http://secunia.com/advisories/31628
12
reference_url http://secunia.com/advisories/32393
reference_id
reference_type
scores
url http://secunia.com/advisories/32393
13
reference_url http://secunia.com/advisories/32485
reference_id
reference_type
scores
url http://secunia.com/advisories/32485
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43550
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43550
15
reference_url https://issues.rpath.com/browse/RPL-2629
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2629
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383
17
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-0585.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0585.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-0957.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0957.html
20
reference_url http://www.ubuntu.com/usn/usn-659-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-659-1
21
reference_url http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
reference_id
reference_type
scores
url http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452666
reference_id 452666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452666
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2372
reference_id CVE-2008-2372
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2372
34
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
35
reference_url https://access.redhat.com/errata/RHSA-2008:0957
reference_id RHSA-2008:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0957
36
reference_url https://usn.ubuntu.com/659-1/
reference_id USN-659-1
reference_type
scores
url https://usn.ubuntu.com/659-1/
fixed_packages
aliases CVE-2008-2372
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv5k-g3b6-hfc2
Fixing_vulnerabilities
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.24.7-74%3Farch=el5rt