{"url":"http://public2.vulnerablecode.io/api/packages/129309?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-53.1.19?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-53.1.19","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88470?format=json","vulnerability_id":"VCID-3xs8-97vd-g7ap","summary":"kernel: race condition in dnotify (local DoS, local roothole possible)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1375.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1375","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21124","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21023","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2109","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21177","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=439754","reference_id":"439754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=439754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://usn.ubuntu.com/614-1/","reference_id":"USN-614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/614-1/"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1375"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xs8-97vd-g7ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88525?format=json","vulnerability_id":"VCID-6a1a-z32k-3bec","summary":"kernel: insufficient range checks in fault handlers with mremap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28405","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28463","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28485","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961","reference_id":"428961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0007"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6a1a-z32k-3bec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88516?format=json","vulnerability_id":"VCID-9wwp-9dpd-s7he","summary":"Kernel doesn't clear DF for signal handlers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367","reference_id":"","reference_type":"","scores":[{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.89012","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.89023","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312","reference_id":"437312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583","reference_id":"465583","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0508","reference_id":"RHSA-2008:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0508"}],"fixed_packages":[],"aliases":["CVE-2008-1367"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wwp-9dpd-s7he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88545?format=json","vulnerability_id":"VCID-asm8-ty2g-4qdq","summary":"[xen-ia64] Dom0 panic while we run ftp test tool between HVM and Dom0.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1619","reference_id":"","reference_type":"","scores":[{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.6921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.6926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69304","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69284","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69328","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.6937","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69406","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437770","reference_id":"437770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"}],"fixed_packages":[],"aliases":["CVE-2008-1619"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-asm8-ty2g-4qdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88478?format=json","vulnerability_id":"VCID-ph1g-6q3g-cfdf","summary":"missing sanity check in xen block backend driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5498","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15509","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15394","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15247","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15375","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15479","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5498"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=369531","reference_id":"369531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=369531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://usn.ubuntu.com/679-1/","reference_id":"USN-679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/679-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5498"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph1g-6q3g-cfdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88465?format=json","vulnerability_id":"VCID-weer-a71h-4kes","summary":"kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1669","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30999","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30342","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30421","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1669"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=443433","reference_id":"443433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=443433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://usn.ubuntu.com/614-1/","reference_id":"USN-614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/614-1/"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1669"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-weer-a71h-4kes"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-53.1.19%3Farch=el5"}