Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85127?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85127?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10", "type": "ebuild", "namespace": "sys-kernel", "name": "usermode-sources", "version": "2.4.24-r10", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.4.24_p0-r1", "latest_non_vulnerable_version": "2.6.8", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60274?format=api", "vulnerability_id": "VCID-xx3w-5nxf-bffb", "summary": "Multiple information leaks have been found in the Linux kernel, allowing an\n attacker to obtain sensitive data which may be used for further\n exploitation of the system.", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U" }, { "reference_url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1058.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1058.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19674", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20002", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20061", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19868", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19931", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19715", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19707", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1058" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532" }, { "reference_url": "http://secunia.com/advisories/18684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18684" }, { "reference_url": "http://secunia.com/advisories/19038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19038" }, { "reference_url": "http://secunia.com/advisories/19369", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19369" }, { "reference_url": "http://secunia.com/advisories/19607", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19607" }, { "reference_url": "http://secunia.com/advisories/21476", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21476" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1018" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-293.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "reference_url": "http://www.securityfocus.com/bid/11052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11052" }, { "reference_url": "http://www.securityfocus.com/bid/11937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11937" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360", "reference_id": "1617360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "reference_id": "CVE-2004-1058", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" }, { "reference_url": "https://security.gentoo.org/glsa/200408-24", "reference_id": "GLSA-200408-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200408-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:293", "reference_id": "RHSA-2005:293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0190", "reference_id": "RHSA-2006:0190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0191", "reference_id": "RHSA-2006:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0191" }, { "reference_url": "https://usn.ubuntu.com/38-1/", "reference_id": "USN-38-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/38-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85124?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.21-r12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.21-r12" }, { "url": "http://public2.vulnerablecode.io/api/packages/85125?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.23-r12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.23-r12" }, { "url": "http://public2.vulnerablecode.io/api/packages/85126?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/85127?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10" }, { "url": "http://public2.vulnerablecode.io/api/packages/85128?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.25_pre7-r11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.25_pre7-r11" }, { "url": "http://public2.vulnerablecode.io/api/packages/78575?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/85129?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r5" }, { "url": "http://public2.vulnerablecode.io/api/packages/85130?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r9" }, { "url": "http://public2.vulnerablecode.io/api/packages/85131?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.26_p7-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26_p7-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85132?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.27-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.27-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85133?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.4.27.2.0.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.27.2.0.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85134?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.5-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.5-r5" }, { "url": "http://public2.vulnerablecode.io/api/packages/85135?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r6" }, { "url": "http://public2.vulnerablecode.io/api/packages/85136?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r8" }, { "url": "http://public2.vulnerablecode.io/api/packages/85137?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r5" }, { "url": "http://public2.vulnerablecode.io/api/packages/85138?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r7" }, { "url": "http://public2.vulnerablecode.io/api/packages/85139?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r12" }, { "url": "http://public2.vulnerablecode.io/api/packages/85140?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p0-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p0-r5" }, { "url": "http://public2.vulnerablecode.io/api/packages/85141?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85142?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.8_rc4-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.8_rc4-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/85143?format=api", "purl": "pkg:ebuild/sys-kernel/usermode-sources@2.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.8" } ], "aliases": [ "CVE-2004-1058" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3w-5nxf-bffb" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10" }