{"url":"http://public2.vulnerablecode.io/api/packages/130040?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-42.0.3?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.9-42.0.3","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88821?format=json","vulnerability_id":"VCID-1fap-3hmp-bfdj","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4997.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4997","reference_id":"","reference_type":"","scores":[{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.96998","published_at":"2026-04-01T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.9701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.9702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97043","published_at":"2026-04-21T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97045","published_at":"2026-04-24T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97047","published_at":"2026-04-26T12:55:00Z"},{"value":"0.35021","scoring_system":"epss","scoring_elements":"0.97048","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4997"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618207","reference_id":"1618207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0710","reference_id":"RHSA-2006:0710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0012","reference_id":"RHSA-2007:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0013","reference_id":"RHSA-2007:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0013"},{"reference_url":"https://usn.ubuntu.com/395-1/","reference_id":"USN-395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/395-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4997"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fap-3hmp-bfdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89010?format=json","vulnerability_id":"VCID-2yj1-xzv3-mkcz","summary":"security flaw","references":[{"reference_url":"http://marc.info/?l=linux-kernel&m=112323336017157","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=linux-kernel&m=112323336017157"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4811.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4811","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14276","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14461","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14329","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14335","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4811"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345"},{"reference_url":"http://secunia.com/advisories/22292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22292"},{"reference_url":"http://secunia.com/advisories/22945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22945"},{"reference_url":"http://secunia.com/advisories/25714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25714"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1304","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1304"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0689.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0689.html"},{"reference_url":"http://www.securityfocus.com/bid/20362","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/20362"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617864","reference_id":"1617864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4811","reference_id":"CVE-2005-4811","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"}],"fixed_packages":[],"aliases":["CVE-2005-4811"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2yj1-xzv3-mkcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88833?format=json","vulnerability_id":"VCID-43vt-4bzd-uyev","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4093.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4093","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19442","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19304","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4093"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618175","reference_id":"1618175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://usn.ubuntu.com/346-1/","reference_id":"USN-346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/346-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4093"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-43vt-4bzd-uyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88868?format=json","vulnerability_id":"VCID-dcw5-t6pw-dbby","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0039.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0039","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20172","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20002","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0039"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617869","reference_id":"1617869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://usn.ubuntu.com/311-1/","reference_id":"USN-311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/311-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0039"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcw5-t6pw-dbby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88826?format=json","vulnerability_id":"VCID-fa7j-z5r2-27cp","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4535.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4535","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29798","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29828","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4535"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618190","reference_id":"1618190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://usn.ubuntu.com/347-1/","reference_id":"USN-347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/347-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4535"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fa7j-z5r2-27cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88884?format=json","vulnerability_id":"VCID-juez-6mks-tkbj","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2071.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2071","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28932","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28979","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28909","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28608","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28537","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618086","reference_id":"1618086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0579","reference_id":"RHSA-2006:0579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0580","reference_id":"RHSA-2006:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0710","reference_id":"RHSA-2006:0710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0710"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2071"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-juez-6mks-tkbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88823?format=json","vulnerability_id":"VCID-qp8e-e2ep-bkhp","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3741","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13778","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13611","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618157","reference_id":"1618157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"}],"fixed_packages":[],"aliases":["CVE-2006-3741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp8e-e2ep-bkhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88831?format=json","vulnerability_id":"VCID-z64h-4dgb-huhy","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4623.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4623","reference_id":"","reference_type":"","scores":[{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94349","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.13987","scoring_system":"epss","scoring_elements":"0.94356","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4623"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618199","reference_id":"1618199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0689","reference_id":"RHSA-2006:0689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0689"},{"reference_url":"https://usn.ubuntu.com/489-1/","reference_id":"USN-489-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/489-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4623"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z64h-4dgb-huhy"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-42.0.3%3Farch=EL"}