Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/130100?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/130100?format=api", "purl": "pkg:rpm/redhat/kernel@2.4.21-47?arch=EL", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.4.21-47", "qualifiers": { "arch": "EL" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88905?format=api", "vulnerability_id": "VCID-12pu-6sqp-ukaf", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25831", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25763", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25527", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0741" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618014", "reference_id": "1618014", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618014" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0493", "reference_id": "RHSA-2006:0493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0493" }, { "reference_url": "https://usn.ubuntu.com/263-1/", "reference_id": "USN-263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/263-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-0741" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-12pu-6sqp-ukaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88882?format=api", "vulnerability_id": "VCID-67xt-b254-pqgb", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1056.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19015", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19151", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18998", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19052", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19059", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1896", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18829", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18809", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18764", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618025", "reference_id": "1618025", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0575", "reference_id": "RHSA-2006:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0579", "reference_id": "RHSA-2006:0579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0579" }, { "reference_url": "https://usn.ubuntu.com/302-1/", "reference_id": "USN-302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/302-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-1056" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-67xt-b254-pqgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88965?format=api", "vulnerability_id": "VCID-8vt6-3yvb-yfhz", "summary": "security flaw", "references": [ { "reference_url": "http://marc.info/?l=linux-kernel&m=112766129313883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=linux-kernel&m=112766129313883" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3055.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25392", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25503", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2554", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25495", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2544", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3055" }, { "reference_url": "http://secunia.com/advisories/17826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17826" }, { "reference_url": "http://secunia.com/advisories/17917", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17917" }, { "reference_url": "http://secunia.com/advisories/17918", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17918" }, { "reference_url": "http://secunia.com/advisories/19374", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19374" }, { "reference_url": "http://secunia.com/advisories/21035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21035" }, { "reference_url": "http://secunia.com/advisories/21136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21136" }, { "reference_url": "http://secunia.com/advisories/21465", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21465" }, { "reference_url": "http://secunia.com/advisories/21983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21983" }, { "reference_url": "http://secunia.com/advisories/22417", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22417" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1017", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1017" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0575.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0575.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0579.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0579.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0580.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0580.html" }, { "reference_url": "http://www.securityfocus.com/advisories/9806", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/advisories/9806" }, { "reference_url": "http://www.securityfocus.com/archive/1/419522/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/419522/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/14955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14955" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/1863", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/1863" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617778", "reference_id": "1617778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617778" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3055", "reference_id": "CVE-2005-3055", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0575", "reference_id": "RHSA-2006:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0579", "reference_id": "RHSA-2006:0579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0580", "reference_id": "RHSA-2006:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0580" }, { "reference_url": "https://usn.ubuntu.com/219-1/", "reference_id": "USN-219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/219-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2005-3055" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vt6-3yvb-yfhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88900?format=api", "vulnerability_id": "VCID-dmf1-95rm-57gz", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1343.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28133", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28082", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28089", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2798", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27661", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1343" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618033", "reference_id": "1618033", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618033" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0575", "reference_id": "RHSA-2006:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0579", "reference_id": "RHSA-2006:0579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0580", "reference_id": "RHSA-2006:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0580" }, { "reference_url": "https://usn.ubuntu.com/281-1/", "reference_id": "USN-281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/281-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-1343" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmf1-95rm-57gz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88863?format=api", "vulnerability_id": "VCID-gkah-kvk5-pqgw", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2444.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98655", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98666", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.9867", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98672", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98676", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.69801", "scoring_system": "epss", "scoring_elements": "0.98678", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618103", "reference_id": "1618103", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618103" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1880.c", "reference_id": "CVE-2006-2444", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1880.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0580", "reference_id": "RHSA-2006:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0617", "reference_id": "RHSA-2006:0617", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0617" }, { "reference_url": "https://usn.ubuntu.com/302-1/", "reference_id": "USN-302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/302-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2444" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gkah-kvk5-pqgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89301?format=api", "vulnerability_id": "VCID-n711-usfp-cufx", "summary": "security flaw", "references": [ { "reference_url": "http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3107.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3107.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3107", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25527", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25831", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25763", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25577", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3107" }, { "reference_url": "http://secunia.com/advisories/17141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17141" }, { "reference_url": "http://secunia.com/advisories/18056", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18056" }, { "reference_url": "http://secunia.com/advisories/21136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21136" }, { "reference_url": "http://secunia.com/advisories/21983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21983" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11473" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm" }, { "reference_url": "http://www.debian.org/security/2005/dsa-922", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-922" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-420.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-420.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0437.html" }, { "reference_url": "http://www.securityfocus.com/bid/15049", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15049" }, { "reference_url": "http://www.ubuntu.com/usn/usn-199-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-199-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617783", "reference_id": "1617783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617783" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3107", "reference_id": "CVE-2005-3107", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:420", "reference_id": "RHSA-2005:420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://usn.ubuntu.com/199-1/", "reference_id": "USN-199-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/199-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2005-3107" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n711-usfp-cufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88895?format=api", "vulnerability_id": "VCID-s977-r8cv-sfbk", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2869", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28772", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2882", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28693", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28692", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28639", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2859", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28364", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28288", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0744" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618016", "reference_id": "1618016", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0493", "reference_id": "RHSA-2006:0493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0493" }, { "reference_url": "https://usn.ubuntu.com/302-1/", "reference_id": "USN-302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/302-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-0744" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s977-r8cv-sfbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88903?format=api", "vulnerability_id": "VCID-ssxc-9pcs-9fft", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0742.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18222", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18373", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18269", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18129", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18162", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18052", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18018", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0742" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618015", "reference_id": "1618015", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0575", "reference_id": "RHSA-2006:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0575" }, { "reference_url": "https://usn.ubuntu.com/263-1/", "reference_id": "USN-263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/263-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-0742" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssxc-9pcs-9fft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88893?format=api", "vulnerability_id": "VCID-u2ks-3sk3-2kdm", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86613", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86624", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86684", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86694", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86705", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0304", "scoring_system": "epss", "scoring_elements": "0.86713", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1242" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618031", "reference_id": "1618031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0437", "reference_id": "RHSA-2006:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0575", "reference_id": "RHSA-2006:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0575" }, { "reference_url": "https://usn.ubuntu.com/281-1/", "reference_id": "USN-281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/281-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-1242" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2ks-3sk3-2kdm" } ], "fixing_vulnerabilities": [], "risk_score": "1.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-47%3Farch=EL" }