Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.4.21-53?arch=EL
Typerpm
Namespaceredhat
Namekernel
Version2.4.21-53
Qualifiers
arch EL
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-8zkt-6zb3-c3gx
vulnerability_id VCID-8zkt-6zb3-c3gx
summary fib_semantics.c out of bounds access vulnerability
references
0
reference_url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6
1
reference_url http://rhn.redhat.com/errata/RHSA-2007-0488.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0488.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2152
published_at 2026-05-07T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21708
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21927
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21692
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.2177
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21826
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21837
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21797
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21747
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-21T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21566
published_at 2026-04-24T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2156
published_at 2026-04-26T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-29T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21455
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2172
4
reference_url http://secunia.com/advisories/25068
reference_id
reference_type
scores
url http://secunia.com/advisories/25068
5
reference_url http://secunia.com/advisories/25288
reference_id
reference_type
scores
url http://secunia.com/advisories/25288
6
reference_url http://secunia.com/advisories/25392
reference_id
reference_type
scores
url http://secunia.com/advisories/25392
7
reference_url http://secunia.com/advisories/25838
reference_id
reference_type
scores
url http://secunia.com/advisories/25838
8
reference_url http://secunia.com/advisories/26289
reference_id
reference_type
scores
url http://secunia.com/advisories/26289
9
reference_url http://secunia.com/advisories/26450
reference_id
reference_type
scores
url http://secunia.com/advisories/26450
10
reference_url http://secunia.com/advisories/26620
reference_id
reference_type
scores
url http://secunia.com/advisories/26620
11
reference_url http://secunia.com/advisories/26647
reference_id
reference_type
scores
url http://secunia.com/advisories/26647
12
reference_url http://secunia.com/advisories/27913
reference_id
reference_type
scores
url http://secunia.com/advisories/27913
13
reference_url http://secunia.com/advisories/29058
reference_id
reference_type
scores
url http://secunia.com/advisories/29058
14
reference_url http://secunia.com/advisories/33280
reference_id
reference_type
scores
url http://secunia.com/advisories/33280
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33979
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764
17
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
18
reference_url http://www.debian.org/security/2007/dsa-1356
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1356
19
reference_url http://www.debian.org/security/2007/dsa-1363
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1363
20
reference_url http://www.debian.org/security/2008/dsa-1503
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1503
21
reference_url http://www.debian.org/security/2008/dsa-1504
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1504
22
reference_url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35
23
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html
24
reference_url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
reference_id
reference_type
scores
url http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
28
reference_url http://www.redhat.com/support/errata/RHSA-2007-0347.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0347.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-1049.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-1049.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0787.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0787.html
31
reference_url http://www.securityfocus.com/bid/23447
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23447
32
reference_url http://www.ubuntu.com/usn/usn-464-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-464-1
33
reference_url http://www.vupen.com/english/advisories/2007/2690
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2690
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250429
reference_id 250429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250429
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
reference_id CVE-2007-2172
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2172
54
reference_url https://access.redhat.com/errata/RHSA-2007:0347
reference_id RHSA-2007:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0347
55
reference_url https://access.redhat.com/errata/RHSA-2007:0488
reference_id RHSA-2007:0488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0488
56
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
57
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
58
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
59
reference_url https://usn.ubuntu.com/464-1/
reference_id USN-464-1
reference_type
scores
url https://usn.ubuntu.com/464-1/
fixed_packages
aliases CVE-2007-2172
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx
1
url VCID-dajb-npd8-6bhn
vulnerability_id VCID-dajb-npd8-6bhn
summary Privilege escalation via PR_SET_PDEATHSIG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3848
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24135
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24901
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.2494
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24713
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24781
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.2484
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24801
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24744
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24748
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24726
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24665
published_at 2026-04-24T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24653
published_at 2026-04-26T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24609
published_at 2026-04-29T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24486
published_at 2026-05-05T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24564
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3848
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250972
reference_id 250972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250972
3
reference_url https://access.redhat.com/errata/RHSA-2007:0939
reference_id RHSA-2007:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0939
4
reference_url https://access.redhat.com/errata/RHSA-2007:0940
reference_id RHSA-2007:0940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0940
5
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/508-1/
reference_id USN-508-1
reference_type
scores
url https://usn.ubuntu.com/508-1/
9
reference_url https://usn.ubuntu.com/509-1/
reference_id USN-509-1
reference_type
scores
url https://usn.ubuntu.com/509-1/
10
reference_url https://usn.ubuntu.com/510-1/
reference_id USN-510-1
reference_type
scores
url https://usn.ubuntu.com/510-1/
fixed_packages
aliases CVE-2007-3848
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dajb-npd8-6bhn
2
url VCID-g983-n195-6uf3
vulnerability_id VCID-g983-n195-6uf3
summary LTC36188-Don't allow the stack to grow into hugetlb reserved regions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3739
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25759
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25801
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25571
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25644
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.2569
published_at 2026-04-09T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25659
published_at 2026-04-12T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25602
published_at 2026-04-13T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-16T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25589
published_at 2026-04-18T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25561
published_at 2026-04-21T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25513
published_at 2026-04-24T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25505
published_at 2026-04-26T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25457
published_at 2026-04-29T12:55:00Z
15
value 0.00095
scoring_system epss
scoring_elements 0.25983
published_at 2026-05-05T12:55:00Z
16
value 0.00095
scoring_system epss
scoring_elements 0.26047
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3739
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=294941
reference_id 294941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=294941
3
reference_url https://access.redhat.com/errata/RHSA-2007:0705
reference_id RHSA-2007:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0705
4
reference_url https://access.redhat.com/errata/RHSA-2007:0939
reference_id RHSA-2007:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0939
5
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
6
reference_url https://usn.ubuntu.com/518-1/
reference_id USN-518-1
reference_type
scores
url https://usn.ubuntu.com/518-1/
fixed_packages
aliases CVE-2007-3739
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g983-n195-6uf3
3
url VCID-q7rz-jbh9-3qef
vulnerability_id VCID-q7rz-jbh9-3qef
summary kernel: Local DoS with corrupted ELF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4538
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24994
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.25034
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24806
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24875
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24935
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24896
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24842
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24853
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24847
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24825
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24768
published_at 2026-04-24T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24757
published_at 2026-04-26T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24712
published_at 2026-04-29T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24587
published_at 2026-05-05T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24664
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4538
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=289151
reference_id 289151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=289151
3
reference_url https://access.redhat.com/errata/RHSA-2007:0014
reference_id RHSA-2007:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0014
4
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
5
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
6
reference_url https://usn.ubuntu.com/347-1/
reference_id USN-347-1
reference_type
scores
url https://usn.ubuntu.com/347-1/
fixed_packages
aliases CVE-2006-4538
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7rz-jbh9-3qef
4
url VCID-syk6-6hck-hka9
vulnerability_id VCID-syk6-6hck-hka9
summary kernel: Missing ioctl() permission checks in aacraid driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4308
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24143
published_at 2026-04-01T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24272
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2409
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24156
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24201
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24178
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24121
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24136
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24099
published_at 2026-04-21T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23974
published_at 2026-04-24T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23961
published_at 2026-04-26T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.23921
published_at 2026-04-29T12:55:00Z
15
value 0.00082
scoring_system epss
scoring_elements 0.23809
published_at 2026-05-05T12:55:00Z
16
value 0.00082
scoring_system epss
scoring_elements 0.2389
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4308
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=252309
reference_id 252309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=252309
3
reference_url https://access.redhat.com/errata/RHSA-2007:0939
reference_id RHSA-2007:0939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0939
4
reference_url https://access.redhat.com/errata/RHSA-2007:0940
reference_id RHSA-2007:0940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0940
5
reference_url https://access.redhat.com/errata/RHSA-2007:1049
reference_id RHSA-2007:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1049
6
reference_url https://access.redhat.com/errata/RHSA-2008:0787
reference_id RHSA-2008:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0787
7
reference_url https://access.redhat.com/errata/RHSA-2009:0001
reference_id RHSA-2009:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0001
8
reference_url https://usn.ubuntu.com/508-1/
reference_id USN-508-1
reference_type
scores
url https://usn.ubuntu.com/508-1/
9
reference_url https://usn.ubuntu.com/509-1/
reference_id USN-509-1
reference_type
scores
url https://usn.ubuntu.com/509-1/
10
reference_url https://usn.ubuntu.com/510-1/
reference_id USN-510-1
reference_type
scores
url https://usn.ubuntu.com/510-1/
fixed_packages
aliases CVE-2007-4308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syk6-6hck-hka9
Fixing_vulnerabilities
Risk_score2.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-53%3Farch=EL