{"url":"http://public2.vulnerablecode.io/api/packages/129478?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-53.1.6?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-53.1.6","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89464?format=json","vulnerability_id":"VCID-dk79-tsxh-jqfa","summary":"Issue with core dump owner","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17715","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22696","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861","reference_id":"396861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6206"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dk79-tsxh-jqfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88556?format=json","vulnerability_id":"VCID-eztm-qyz3-2bcq","summary":"Security: vulnerability of copy_to_user in PAL emulation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6416","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29985","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29595","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6416"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=425381","reference_id":"425381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=425381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"}],"fixed_packages":[],"aliases":["CVE-2007-6416"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eztm-qyz3-2bcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88603?format=json","vulnerability_id":"VCID-fa96-2a2s-37ff","summary":"Buffer overflow in CIFS VFS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5904.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5904","reference_id":"","reference_type":"","scores":[{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83579","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8358","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83613","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83617","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5904"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=372701","reference_id":"372701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=372701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0167","reference_id":"RHSA-2008:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0167"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5904"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fa96-2a2s-37ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88540?format=json","vulnerability_id":"VCID-pzfw-w49r-vkep","summary":"kernel: filesystem corruption by unprivileged user via directory truncation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0001.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0001","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11282","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11218","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428791","reference_id":"428791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0001"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzfw-w49r-vkep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88681?format=json","vulnerability_id":"VCID-xpmf-cu3q-47cn","summary":"Null pointer to an inode in a dentry can cause an oops in sysfs_readdir","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html"},{"reference_url":"http://osvdb.org/37115","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37115"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3104.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3104","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34675","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3489","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34834","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34789","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34532","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3104"},{"reference_url":"http://secunia.com/advisories/25771","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25771"},{"reference_url":"http://secunia.com/advisories/25838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25838"},{"reference_url":"http://secunia.com/advisories/26289","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26289"},{"reference_url":"http://secunia.com/advisories/26643","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26643"},{"reference_url":"http://secunia.com/advisories/26651","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26651"},{"reference_url":"http://secunia.com/advisories/27912","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27912"},{"reference_url":"http://secunia.com/advisories/28033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28033"},{"reference_url":"http://secunia.com/advisories/28643","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1428","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1428"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0089.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0089.html"},{"reference_url":"http://www.securityfocus.com/bid/24631","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24631"},{"reference_url":"http://www.securitytracker.com/id?1018289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018289"},{"reference_url":"http://www.ubuntu.com/usn/usn-508-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-508-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-509-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-509-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-510-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-510-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427994","reference_id":"427994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3104","reference_id":"CVE-2007-3104","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0488","reference_id":"RHSA-2007:0488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://usn.ubuntu.com/508-1/","reference_id":"USN-508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/508-1/"},{"reference_url":"https://usn.ubuntu.com/509-1/","reference_id":"USN-509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/509-1/"},{"reference_url":"https://usn.ubuntu.com/510-1/","reference_id":"USN-510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/510-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3104"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpmf-cu3q-47cn"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-53.1.6%3Farch=el5"}