{"url":"http://public2.vulnerablecode.io/api/packages/129665?format=json","purl":"pkg:rpm/redhat/kernel@2.4.21-53?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.4.21-53","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88732?format=json","vulnerability_id":"VCID-8zkt-6zb3-c3gx","summary":"fib_semantics.c out of bounds access vulnerability","references":[{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0488.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21455","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2172"},{"reference_url":"http://secunia.com/advisories/25068","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25068"},{"reference_url":"http://secunia.com/advisories/25288","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25288"},{"reference_url":"http://secunia.com/advisories/25392","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25392"},{"reference_url":"http://secunia.com/advisories/25838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25838"},{"reference_url":"http://secunia.com/advisories/26289","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26289"},{"reference_url":"http://secunia.com/advisories/26450","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26450"},{"reference_url":"http://secunia.com/advisories/26620","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26620"},{"reference_url":"http://secunia.com/advisories/26647","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26647"},{"reference_url":"http://secunia.com/advisories/27913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27913"},{"reference_url":"http://secunia.com/advisories/29058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29058"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33979"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1356","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1356"},{"reference_url":"http://www.debian.org/security/2007/dsa-1363","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1363"},{"reference_url":"http://www.debian.org/security/2008/dsa-1503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1503"},{"reference_url":"http://www.debian.org/security/2008/dsa-1504","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1504"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html"},{"reference_url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:216"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0347.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-1049.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.securityfocus.com/bid/23447","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23447"},{"reference_url":"http://www.ubuntu.com/usn/usn-464-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-464-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2690","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429","reference_id":"250429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172","reference_id":"CVE-2007-2172","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0347","reference_id":"RHSA-2007:0347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0488","reference_id":"RHSA-2007:0488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/464-1/","reference_id":"USN-464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/464-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2172"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zkt-6zb3-c3gx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88660?format=json","vulnerability_id":"VCID-dajb-npd8-6bhn","summary":"Privilege escalation via PR_SET_PDEATHSIG","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3848","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24713","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24781","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24748","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24726","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24486","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24564","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250972","reference_id":"250972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0939","reference_id":"RHSA-2007:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0940","reference_id":"RHSA-2007:0940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/508-1/","reference_id":"USN-508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/508-1/"},{"reference_url":"https://usn.ubuntu.com/509-1/","reference_id":"USN-509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/509-1/"},{"reference_url":"https://usn.ubuntu.com/510-1/","reference_id":"USN-510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/510-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3848"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dajb-npd8-6bhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88655?format=json","vulnerability_id":"VCID-g983-n195-6uf3","summary":"LTC36188-Don't allow the stack to grow into hugetlb reserved regions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3739.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3739","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25571","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.25983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26047","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3739"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=294941","reference_id":"294941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=294941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0705","reference_id":"RHSA-2007:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0939","reference_id":"RHSA-2007:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://usn.ubuntu.com/518-1/","reference_id":"USN-518-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/518-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3739"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g983-n195-6uf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88828?format=json","vulnerability_id":"VCID-q7rz-jbh9-3qef","summary":"kernel: Local DoS with corrupted ELF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4538","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.25034","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24664","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4538"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=289151","reference_id":"289151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=289151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0014","reference_id":"RHSA-2007:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://usn.ubuntu.com/347-1/","reference_id":"USN-347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/347-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4538"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7rz-jbh9-3qef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88668?format=json","vulnerability_id":"VCID-syk6-6hck-hka9","summary":"kernel: Missing ioctl() permission checks in aacraid driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4308","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2389","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4308"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=252309","reference_id":"252309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=252309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0939","reference_id":"RHSA-2007:0939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0940","reference_id":"RHSA-2007:0940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1049","reference_id":"RHSA-2007:1049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/508-1/","reference_id":"USN-508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/508-1/"},{"reference_url":"https://usn.ubuntu.com/509-1/","reference_id":"USN-509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/509-1/"},{"reference_url":"https://usn.ubuntu.com/510-1/","reference_id":"USN-510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/510-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4308"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-syk6-6hck-hka9"}],"fixing_vulnerabilities":[],"risk_score":"2.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-53%3Farch=EL"}