{"url":"http://public2.vulnerablecode.io/api/packages/130100?format=json","purl":"pkg:rpm/redhat/kernel@2.4.21-47?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.4.21-47","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88905?format=json","vulnerability_id":"VCID-12pu-6sqp-ukaf","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0741","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2548","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25481","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618014","reference_id":"1618014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/263-1/","reference_id":"USN-263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/263-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12pu-6sqp-ukaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88882?format=json","vulnerability_id":"VCID-67xt-b254-pqgb","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1056.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1056","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19015","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19151","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19059","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18927","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18829","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18645","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18728","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18831","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18824","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618025","reference_id":"1618025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0575","reference_id":"RHSA-2006:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0579","reference_id":"RHSA-2006:0579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0579"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1056"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67xt-b254-pqgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88965?format=json","vulnerability_id":"VCID-8vt6-3yvb-yfhz","summary":"security flaw","references":[{"reference_url":"http://marc.info/?l=linux-kernel&m=112766129313883","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=linux-kernel&m=112766129313883"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3055.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3055","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25343","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2554","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25406","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25327","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3055"},{"reference_url":"http://secunia.com/advisories/17826","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17826"},{"reference_url":"http://secunia.com/advisories/17917","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17917"},{"reference_url":"http://secunia.com/advisories/17918","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17918"},{"reference_url":"http://secunia.com/advisories/19374","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19374"},{"reference_url":"http://secunia.com/advisories/21035","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21035"},{"reference_url":"http://secunia.com/advisories/21136","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21136"},{"reference_url":"http://secunia.com/advisories/21465","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21465"},{"reference_url":"http://secunia.com/advisories/21983","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21983"},{"reference_url":"http://secunia.com/advisories/22417","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22417"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm"},{"reference_url":"http://www.debian.org/security/2006/dsa-1017","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1017"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0437.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0437.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0575.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0575.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0579.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0579.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0580.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0580.html"},{"reference_url":"http://www.securityfocus.com/advisories/9806","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/advisories/9806"},{"reference_url":"http://www.securityfocus.com/archive/1/419522/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/419522/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14955","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14955"},{"reference_url":"http://www.vupen.com/english/advisories/2005/1863","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/1863"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617778","reference_id":"1617778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617778"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3055","reference_id":"CVE-2005-3055","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0575","reference_id":"RHSA-2006:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0579","reference_id":"RHSA-2006:0579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0580","reference_id":"RHSA-2006:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0580"},{"reference_url":"https://usn.ubuntu.com/219-1/","reference_id":"USN-219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/219-1/"}],"fixed_packages":[],"aliases":["CVE-2005-3055"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8vt6-3yvb-yfhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88900?format=json","vulnerability_id":"VCID-dmf1-95rm-57gz","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1343.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1343","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28133","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28039","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27551","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27574","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27496","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27512","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1343"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618033","reference_id":"1618033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0575","reference_id":"RHSA-2006:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0579","reference_id":"RHSA-2006:0579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0580","reference_id":"RHSA-2006:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0580"},{"reference_url":"https://usn.ubuntu.com/281-1/","reference_id":"USN-281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/281-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1343"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dmf1-95rm-57gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88863?format=json","vulnerability_id":"VCID-gkah-kvk5-pqgw","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2444.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2444.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2444","reference_id":"","reference_type":"","scores":[{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98658","published_at":"2026-04-04T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.9867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98676","published_at":"2026-04-26T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98682","published_at":"2026-05-07T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98683","published_at":"2026-05-09T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98684","published_at":"2026-05-11T12:55:00Z"},{"value":"0.69801","scoring_system":"epss","scoring_elements":"0.98686","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618103","reference_id":"1618103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618103"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1880.c","reference_id":"CVE-2006-2444","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1880.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0580","reference_id":"RHSA-2006:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0617","reference_id":"RHSA-2006:0617","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0617"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2444"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gkah-kvk5-pqgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89301?format=json","vulnerability_id":"VCID-n711-usfp-cufx","summary":"security flaw","references":[{"reference_url":"http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c","reference_id":"","reference_type":"","scores":[],"url":"http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3107.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3107.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3107","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25481","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2548","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25464","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3107"},{"reference_url":"http://secunia.com/advisories/17141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17141"},{"reference_url":"http://secunia.com/advisories/18056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18056"},{"reference_url":"http://secunia.com/advisories/21136","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21136"},{"reference_url":"http://secunia.com/advisories/21983","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21983"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11473","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11473"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm"},{"reference_url":"http://www.debian.org/security/2005/dsa-922","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-922"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:072","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-420.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-420.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0437.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0437.html"},{"reference_url":"http://www.securityfocus.com/bid/15049","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15049"},{"reference_url":"http://www.ubuntu.com/usn/usn-199-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-199-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617783","reference_id":"1617783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617783"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3107","reference_id":"CVE-2005-3107","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:420","reference_id":"RHSA-2005:420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://usn.ubuntu.com/199-1/","reference_id":"USN-199-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/199-1/"}],"fixed_packages":[],"aliases":["CVE-2005-3107"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n711-usfp-cufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88895?format=json","vulnerability_id":"VCID-s977-r8cv-sfbk","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0744","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2869","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28146","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0744"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618016","reference_id":"1618016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0744"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s977-r8cv-sfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88903?format=json","vulnerability_id":"VCID-ssxc-9pcs-9fft","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0742.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0742.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0742","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17968","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1807","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18033","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18067","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0742"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618015","reference_id":"1618015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0575","reference_id":"RHSA-2006:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0575"},{"reference_url":"https://usn.ubuntu.com/263-1/","reference_id":"USN-263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/263-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0742"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssxc-9pcs-9fft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88893?format=json","vulnerability_id":"VCID-u2ks-3sk3-2kdm","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1242","reference_id":"","reference_type":"","scores":[{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86624","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86735","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86753","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86766","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0304","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618031","reference_id":"1618031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0575","reference_id":"RHSA-2006:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0575"},{"reference_url":"https://usn.ubuntu.com/281-1/","reference_id":"USN-281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/281-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1242"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u2ks-3sk3-2kdm"}],"fixing_vulnerabilities":[],"risk_score":"1.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-47%3Farch=EL"}