Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-3kqr-tasz-u3cq
Summarykernel listxattr syscall can corrupt user space programs
Aliases
0
alias CVE-2006-5753
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.9-42.0.8?arch=EL
purl pkg:rpm/redhat/kernel@2.6.9-42.0.8?arch=EL
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kqr-tasz-u3cq
1
vulnerability VCID-73qu-9enf-gbej
2
vulnerability VCID-9kfg-t3ym-dbfh
3
vulnerability VCID-9q8w-uane-gyh2
4
vulnerability VCID-aq86-jxkp-wbfe
5
vulnerability VCID-d91v-h4jm-bffj
6
vulnerability VCID-e1x9-pf3a-1uby
7
vulnerability VCID-e5fn-tpz2-pbfd
8
vulnerability VCID-epw9-8ew1-xyh9
9
vulnerability VCID-hwt2-263n-8ffg
10
vulnerability VCID-hzyy-pqbp-5yga
11
vulnerability VCID-q7rz-jbh9-3qef
12
vulnerability VCID-rrxg-9nr8-cqev
13
vulnerability VCID-s3db-8cbn-a3bs
14
vulnerability VCID-xms5-ba1y-yfca
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-42.0.8%3Farch=EL
References
0
reference_url http://fedoranews.org/cms/node/2739
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2739
1
reference_url http://fedoranews.org/cms/node/2740
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2740
2
reference_url http://lkml.org/lkml/2007/1/3/150
reference_id
reference_type
scores
url http://lkml.org/lkml/2007/1/3/150
3
reference_url http://osvdb.org/33020
reference_id
reference_type
scores
url http://osvdb.org/33020
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5753.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5753.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5753
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24662
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.247
published_at 2026-04-04T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24472
published_at 2026-04-07T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24542
published_at 2026-04-08T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24587
published_at 2026-04-09T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24603
published_at 2026-04-11T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.2456
published_at 2026-04-12T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24506
published_at 2026-04-13T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24585
published_at 2026-04-01T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.29691
published_at 2026-05-09T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.29619
published_at 2026-05-11T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.2964
published_at 2026-05-12T12:55:00Z
12
value 0.00115
scoring_system epss
scoring_elements 0.30079
published_at 2026-04-16T12:55:00Z
13
value 0.00115
scoring_system epss
scoring_elements 0.30056
published_at 2026-04-18T12:55:00Z
14
value 0.00115
scoring_system epss
scoring_elements 0.3001
published_at 2026-04-21T12:55:00Z
15
value 0.00115
scoring_system epss
scoring_elements 0.2994
published_at 2026-04-24T12:55:00Z
16
value 0.00115
scoring_system epss
scoring_elements 0.29824
published_at 2026-04-26T12:55:00Z
17
value 0.00115
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-29T12:55:00Z
18
value 0.00115
scoring_system epss
scoring_elements 0.29614
published_at 2026-05-05T12:55:00Z
19
value 0.00115
scoring_system epss
scoring_elements 0.29677
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5753
6
reference_url http://secunia.com/advisories/23955
reference_id
reference_type
scores
url http://secunia.com/advisories/23955
7
reference_url http://secunia.com/advisories/23997
reference_id
reference_type
scores
url http://secunia.com/advisories/23997
8
reference_url http://secunia.com/advisories/24098
reference_id
reference_type
scores
url http://secunia.com/advisories/24098
9
reference_url http://secunia.com/advisories/24100
reference_id
reference_type
scores
url http://secunia.com/advisories/24100
10
reference_url http://secunia.com/advisories/24206
reference_id
reference_type
scores
url http://secunia.com/advisories/24206
11
reference_url http://secunia.com/advisories/24400
reference_id
reference_type
scores
url http://secunia.com/advisories/24400
12
reference_url http://secunia.com/advisories/24429
reference_id
reference_type
scores
url http://secunia.com/advisories/24429
13
reference_url http://secunia.com/advisories/24482
reference_id
reference_type
scores
url http://secunia.com/advisories/24482
14
reference_url http://secunia.com/advisories/24547
reference_id
reference_type
scores
url http://secunia.com/advisories/24547
15
reference_url http://secunia.com/advisories/25226
reference_id
reference_type
scores
url http://secunia.com/advisories/25226
16
reference_url http://secunia.com/advisories/25683
reference_id
reference_type
scores
url http://secunia.com/advisories/25683
17
reference_url http://secunia.com/advisories/25691
reference_id
reference_type
scores
url http://secunia.com/advisories/25691
18
reference_url http://secunia.com/advisories/25714
reference_id
reference_type
scores
url http://secunia.com/advisories/25714
19
reference_url http://secunia.com/advisories/29058
reference_id
reference_type
scores
url http://secunia.com/advisories/29058
20
reference_url https://issues.rpath.com/browse/RPL-1106
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1106
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371
22
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
23
reference_url http://www.debian.org/security/2007/dsa-1304
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1304
24
reference_url http://www.debian.org/security/2008/dsa-1503
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1503
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
27
reference_url http://www.novell.com/linux/security/advisories/2007_18_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_18_kernel.html
28
reference_url http://www.novell.com/linux/security/advisories/2007_21_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_21_kernel.html
29
reference_url http://www.novell.com/linux/security/advisories/2007_30_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_30_kernel.html
30
reference_url http://www.novell.com/linux/security/advisories/2007_35_kernel.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_35_kernel.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2007-0014.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0014.html
32
reference_url http://www.securityfocus.com/archive/1/471457
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471457
33
reference_url http://www.securityfocus.com/bid/22316
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22316
34
reference_url http://www.ubuntu.com/usn/usn-416-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-416-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=306891
reference_id 306891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=306891
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5753
reference_id CVE-2006-5753
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-5753
42
reference_url https://access.redhat.com/errata/RHSA-2007:0014
reference_id RHSA-2007:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0014
43
reference_url https://usn.ubuntu.com/416-1/
reference_id USN-416-1
reference_type
scores
url https://usn.ubuntu.com/416-1/
Weaknesses
0
cwe_id 681
name Incorrect Conversion between Numeric Types
description When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score7.2 - 7.2
Exploitability0.5
Weighted_severity6.5
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-3kqr-tasz-u3cq