Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-b2xr-5rte-2bbp
Summarykernel: hfsplus: check read_mapping_page() return value
Aliases
0
alias CVE-2008-4934
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.9-78.0.13?arch=EL
purl pkg:rpm/redhat/kernel@2.6.9-78.0.13?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cfn-4mhs-2fg7
1
vulnerability VCID-9w9u-nst5-wqe2
2
vulnerability VCID-b2xr-5rte-2bbp
3
vulnerability VCID-cf2v-zn7q-b3gd
4
vulnerability VCID-cjuk-9q5q-xyfu
5
vulnerability VCID-fa3j-zzuw-syag
6
vulnerability VCID-jjep-3pwc-47g1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-78.0.13%3Farch=EL
1
url pkg:rpm/redhat/kernel@2.6.18-128.1.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-128.1.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hxp-mzvt-7bag
1
vulnerability VCID-37h4-mjqm-tbb7
2
vulnerability VCID-9w9u-nst5-wqe2
3
vulnerability VCID-b2xr-5rte-2bbp
4
vulnerability VCID-jjep-3pwc-47g1
5
vulnerability VCID-swun-emtf-2fev
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-128.1.1%3Farch=el5
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=649f1ee6c705aab644035a7998d7b574193a598a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=649f1ee6c705aab644035a7998d7b574193a598a
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc1
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc1
2
reference_url http://rhn.redhat.com/errata/RHSA-2009-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2009-0264.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4934.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4934.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4934
reference_id
reference_type
scores
0
value 0.01279
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-29T12:55:00Z
1
value 0.01279
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-01T12:55:00Z
2
value 0.01279
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-02T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79548
published_at 2026-04-04T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-07T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.79563
published_at 2026-04-08T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-11T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.79576
published_at 2026-04-12T12:55:00Z
9
value 0.01279
scoring_system epss
scoring_elements 0.79568
published_at 2026-04-13T12:55:00Z
10
value 0.01279
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-16T12:55:00Z
11
value 0.01279
scoring_system epss
scoring_elements 0.79596
published_at 2026-04-18T12:55:00Z
12
value 0.01279
scoring_system epss
scoring_elements 0.796
published_at 2026-04-21T12:55:00Z
13
value 0.01279
scoring_system epss
scoring_elements 0.79632
published_at 2026-04-24T12:55:00Z
14
value 0.01279
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4934
5
reference_url http://secunia.com/advisories/32510
reference_id
reference_type
scores
url http://secunia.com/advisories/32510
6
reference_url http://secunia.com/advisories/32918
reference_id
reference_type
scores
url http://secunia.com/advisories/32918
7
reference_url http://secunia.com/advisories/32998
reference_id
reference_type
scores
url http://secunia.com/advisories/32998
8
reference_url http://secunia.com/advisories/33180
reference_id
reference_type
scores
url http://secunia.com/advisories/33180
9
reference_url http://secunia.com/advisories/33556
reference_id
reference_type
scores
url http://secunia.com/advisories/33556
10
reference_url http://secunia.com/advisories/33858
reference_id
reference_type
scores
url http://secunia.com/advisories/33858
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46327
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46327
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11635
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11635
13
reference_url http://www.debian.org/security/2008/dsa-1681
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1681
14
reference_url http://www.debian.org/security/2008/dsa-1687
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1687
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:234
16
reference_url http://www.openwall.com/lists/oss-security/2008/11/03/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/03/2
17
reference_url http://www.redhat.com/support/errata/RHSA-2009-0014.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0014.html
18
reference_url http://www.securityfocus.com/bid/32096
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32096
19
reference_url http://www.ubuntu.com/usn/usn-679-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-679-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=469640
reference_id 469640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=469640
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4934
reference_id CVE-2008-4934
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4934
28
reference_url https://access.redhat.com/errata/RHSA-2009:0014
reference_id RHSA-2009:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0014
29
reference_url https://access.redhat.com/errata/RHSA-2009:0264
reference_id RHSA-2009:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0264
30
reference_url https://usn.ubuntu.com/679-1/
reference_id USN-679-1
reference_type
scores
url https://usn.ubuntu.com/679-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score7.8 - 7.8
Exploitability0.5
Weighted_severity7.0
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-b2xr-5rte-2bbp