{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87111?format=json","vulnerability_id":"VCID-ushy-m8mj-qbe6","summary":"kvm: device assignment page leak","aliases":[{"alias":"CVE-2012-2121"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/125966?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-220.23.1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-486y-9v9t-x3hx"},{"vulnerability":"VCID-aszd-q4dg-bbgw"},{"vulnerability":"VCID-cae1-x9uv-c3fu"},{"vulnerability":"VCID-cz7k-mjp3-g3hn"},{"vulnerability":"VCID-dzp6-pjj8-ruhf"},{"vulnerability":"VCID-n2hd-pete-vka3"},{"vulnerability":"VCID-qrt5-vdfy-k3eb"},{"vulnerability":"VCID-ushy-m8mj-qbe6"},{"vulnerability":"VCID-xgu5-vemd-jqh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-220.23.1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/126098?format=json","purl":"pkg:rpm/redhat/kvm@83-249.el5_8?arch=4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-p1jq-ktnw-ykbg"},{"vulnerability":"VCID-ushy-m8mj-qbe6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kvm@83-249.el5_8%3Farch=4"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2121","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3224","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32111","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31539","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3162","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31529","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31552","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2121"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=814149","reference_id":"814149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=814149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0676","reference_id":"RHSA-2012:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0743","reference_id":"RHSA-2012:0743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0743"},{"reference_url":"https://usn.ubuntu.com/1457-1/","reference_id":"USN-1457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1457-1/"},{"reference_url":"https://usn.ubuntu.com/1470-1/","reference_id":"USN-1470-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1470-1/"},{"reference_url":"https://usn.ubuntu.com/1471-1/","reference_id":"USN-1471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1471-1/"},{"reference_url":"https://usn.ubuntu.com/1472-1/","reference_id":"USN-1472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1472-1/"},{"reference_url":"https://usn.ubuntu.com/1473-1/","reference_id":"USN-1473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1473-1/"},{"reference_url":"https://usn.ubuntu.com/1474-1/","reference_id":"USN-1474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1474-1/"},{"reference_url":"https://usn.ubuntu.com/1476-1/","reference_id":"USN-1476-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1476-1/"},{"reference_url":"https://usn.ubuntu.com/1577-1/","reference_id":"USN-1577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1577-1/"},{"reference_url":"https://usn.ubuntu.com/2036-1/","reference_id":"USN-2036-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2036-1/"},{"reference_url":"https://usn.ubuntu.com/2037-1/","reference_id":"USN-2037-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2037-1/"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ushy-m8mj-qbe6"}