{"url":"http://public2.vulnerablecode.io/api/packages/130101?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-34.0.1?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.9-34.0.1","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88905?format=json","vulnerability_id":"VCID-12pu-6sqp-ukaf","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0741","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25527","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618014","reference_id":"1618014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/263-1/","reference_id":"USN-263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/263-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12pu-6sqp-ukaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88880?format=json","vulnerability_id":"VCID-2js5-ekm3-83d3","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1864.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1864","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53618","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53575","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53539","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618071","reference_id":"1618071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618071"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27766.txt","reference_id":"CVE-2006-1864;OSVDB-25067","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27766.txt"},{"reference_url":"https://www.securityfocus.com/bid/17735/info","reference_id":"CVE-2006-1864;OSVDB-25067","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/17735/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0579","reference_id":"RHSA-2006:0579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0580","reference_id":"RHSA-2006:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0710","reference_id":"RHSA-2006:0710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0710"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1864"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2js5-ekm3-83d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88991?format=json","vulnerability_id":"VCID-3sp6-rydh-q3h6","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1528.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1528","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25356","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25354","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25232","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1528"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618044","reference_id":"1618044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1528"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sp6-rydh-q3h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88936?format=json","vulnerability_id":"VCID-3sqj-gj59-a7bc","summary":"security flaw","references":[{"reference_url":"http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg","reference_id":"","reference_type":"","scores":[],"url":"http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3359.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3359.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3359","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13778","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13705","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3359"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175769","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175769"},{"reference_url":"http://secunia.com/advisories/19220","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19220"},{"reference_url":"http://secunia.com/advisories/20237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20237"},{"reference_url":"http://secunia.com/advisories/20914","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20914"},{"reference_url":"http://secunia.com/advisories/21745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21745"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10214","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10214"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"},{"reference_url":"http://www.debian.org/security/2006/dsa-1103","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1103"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:059","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:059"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html"},{"reference_url":"http://www.securityfocus.com/bid/17078","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/17078"},{"reference_url":"http://www.vupen.com/english/advisories/2006/2554","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/2554"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617820","reference_id":"1617820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617820"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3359","reference_id":"CVE-2005-3359","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/263-1/","reference_id":"USN-263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/263-1/"}],"fixed_packages":[],"aliases":["CVE-2005-3359"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sqj-gj59-a7bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89080?format=json","vulnerability_id":"VCID-6uhj-wvur-pfec","summary":"security flaw","references":[{"reference_url":"http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A","reference_id":"","reference_type":"","scores":[],"url":"http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3272.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3272","reference_id":"","reference_type":"","scores":[{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81965","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82012","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3272"},{"reference_url":"http://secunia.com/advisories/18056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18056"},{"reference_url":"http://secunia.com/advisories/20237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20237"},{"reference_url":"http://secunia.com/advisories/21745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21745"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10157","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10157"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"},{"reference_url":"http://www.debian.org/security/2005/dsa-922","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-922"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:025","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:025"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html"},{"reference_url":"http://www.securityfocus.com/bid/15536","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15536"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617809","reference_id":"1617809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617809"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3272","reference_id":"CVE-2005-3272","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3272"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/219-1/","reference_id":"USN-219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/219-1/"}],"fixed_packages":[],"aliases":["CVE-2005-3272"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6uhj-wvur-pfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88873?format=json","vulnerability_id":"VCID-8ee7-uutj-tkga","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2274.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2274.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2274","reference_id":"","reference_type":"","scores":[{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2274"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618096","reference_id":"1618096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2274"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ee7-uutj-tkga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88867?format=json","vulnerability_id":"VCID-9w7y-x6qh-hqe5","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1862.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1862","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28578","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28363","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28172","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618069","reference_id":"1618069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"}],"fixed_packages":[],"aliases":["CVE-2006-1862"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9w7y-x6qh-hqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88875?format=json","vulnerability_id":"VCID-a9xm-qmb4-abav","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2271.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2271","reference_id":"","reference_type":"","scores":[{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92178","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2271"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618093","reference_id":"1618093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2271"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9xm-qmb4-abav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88876?format=json","vulnerability_id":"VCID-au74-n67r-a3ck","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2272.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2272","reference_id":"","reference_type":"","scores":[{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.9218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08126","scoring_system":"epss","scoring_elements":"0.92178","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2272"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618094","reference_id":"1618094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2272"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au74-n67r-a3ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88960?format=json","vulnerability_id":"VCID-egp8-dpjt-2bh9","summary":"security flaw","references":[{"reference_url":"http://linux.bkbits.net:8080/linux-2.6/cset%404342df67SNhRx_3FGhUrrU-FXLlQIA","reference_id":"","reference_type":"","scores":[],"url":"http://linux.bkbits.net:8080/linux-2.6/cset%404342df67SNhRx_3FGhUrrU-FXLlQIA"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2973.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2973","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51151","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51228","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2973"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170772","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170772"},{"reference_url":"http://secunia.com/advisories/17261","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17261"},{"reference_url":"http://secunia.com/advisories/17280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17280"},{"reference_url":"http://secunia.com/advisories/17917","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17917"},{"reference_url":"http://secunia.com/advisories/17918","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17918"},{"reference_url":"http://secunia.com/advisories/18562","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18562"},{"reference_url":"http://secunia.com/advisories/18684","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18684"},{"reference_url":"http://secunia.com/advisories/19185","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19185"},{"reference_url":"http://secunia.com/advisories/19369","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19369"},{"reference_url":"http://secunia.com/advisories/19374","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19374"},{"reference_url":"http://secunia.com/advisories/20237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20237"},{"reference_url":"http://secunia.com/advisories/21745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21745"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10041","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10041"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"},{"reference_url":"http://www.debian.org/security/2006/dsa-1017","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1017"},{"reference_url":"http://www.debian.org/security/2006/dsa-1018","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1018"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:040"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:072","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"},{"reference_url":"http://www.osvdb.org/20163","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/20163"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0140.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0140.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0190.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0190.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0191.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0191.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html"},{"reference_url":"http://www.securityfocus.com/advisories/9549","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/advisories/9549"},{"reference_url":"http://www.securityfocus.com/advisories/9555","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/advisories/9555"},{"reference_url":"http://www.securityfocus.com/advisories/9806","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/advisories/9806"},{"reference_url":"http://www.securityfocus.com/archive/1/419522/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/419522/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427980/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427980/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/428028/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428028/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/428058/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428058/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15156","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15156"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2173","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2173"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617770","reference_id":"1617770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617770"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2973","reference_id":"CVE-2005-2973","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2973"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/26382.c","reference_id":"CVE-2005-2973;OSVDB-20163","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/26382.c"},{"reference_url":"https://www.securityfocus.com/bid/15156/info","reference_id":"CVE-2005-2973;OSVDB-20163","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/15156/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0140","reference_id":"RHSA-2006:0140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0190","reference_id":"RHSA-2006:0190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0191","reference_id":"RHSA-2006:0191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/219-1/","reference_id":"USN-219-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/219-1/"}],"fixed_packages":[],"aliases":["CVE-2005-2973"],"risk_score":3.8,"exploitability":"2.0","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egp8-dpjt-2bh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88866?format=json","vulnerability_id":"VCID-f55w-gbrp-1khp","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1855.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1855","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25396","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25358","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25364","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25234","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618064","reference_id":"1618064","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1855"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f55w-gbrp-1khp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88963?format=json","vulnerability_id":"VCID-n7wv-17ht-9qfv","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1856.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1856","reference_id":"","reference_type":"","scores":[{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84694","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.8473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84773","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.8479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84824","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0231","scoring_system":"epss","scoring_elements":"0.84823","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1856"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618066","reference_id":"1618066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1856"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7wv-17ht-9qfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88886?format=json","vulnerability_id":"VCID-pr47-hqyh-uyhf","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1522.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1522","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21831","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21814","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21676","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21667","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1522"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618040","reference_id":"1618040","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1522"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pr47-hqyh-uyhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88895?format=json","vulnerability_id":"VCID-s977-r8cv-sfbk","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0744","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2869","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28288","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0744"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618016","reference_id":"1618016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0437","reference_id":"RHSA-2006:0437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0744"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s977-r8cv-sfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88904?format=json","vulnerability_id":"VCID-trxw-5nke-cbeq","summary":"NFS client panic using O_DIRECT","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0555","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26537","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26457","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0555"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=181795","reference_id":"181795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=181795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/263-1/","reference_id":"USN-263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/263-1/"}],"fixed_packages":[],"aliases":["CVE-2006-0555"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trxw-5nke-cbeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88885?format=json","vulnerability_id":"VCID-x6t6-yp6h-zqcg","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1525.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1525","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25938","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25686","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618041","reference_id":"1618041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/281-1/","reference_id":"USN-281-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/281-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1525"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6t6-yp6h-zqcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88877?format=json","vulnerability_id":"VCID-ygfr-um9r-uuf1","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1527","reference_id":"","reference_type":"","scores":[{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09301","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1527"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618043","reference_id":"1618043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0493","reference_id":"RHSA-2006:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0493"},{"reference_url":"https://usn.ubuntu.com/302-1/","reference_id":"USN-302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/302-1/"}],"fixed_packages":[],"aliases":["CVE-2006-1527"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygfr-um9r-uuf1"}],"fixing_vulnerabilities":[],"risk_score":"3.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-34.0.1%3Farch=EL"}