Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
Typerpm
Namespaceredhat
Namekernel-rt
Version2.6.33.7-rt29.55
Qualifiers
arch el5rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-13jv-4raj-3bc6
vulnerability_id VCID-13jv-4raj-3bc6
summary kernel: net/sched/act_police.c infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=0f04cfd098fb81fded74e78ea1a1b86cc6c6c31e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=0f04cfd098fb81fded74e78ea1a1b86cc6c6c31e
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3477.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3477
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.2351
published_at 2026-04-26T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23683
published_at 2026-04-01T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23799
published_at 2026-04-02T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23839
published_at 2026-04-04T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23616
published_at 2026-04-07T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23685
published_at 2026-04-08T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23747
published_at 2026-04-11T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23704
published_at 2026-04-12T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23648
published_at 2026-04-13T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.2366
published_at 2026-04-16T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23652
published_at 2026-04-18T12:55:00Z
12
value 0.0008
scoring_system epss
scoring_elements 0.23633
published_at 2026-04-21T12:55:00Z
13
value 0.0008
scoring_system epss
scoring_elements 0.23521
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3477
3
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
4
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
5
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
7
reference_url http://www.redhat.com/support/errata/RHSA-2010-0779.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0779.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2010-0839.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0839.html
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
10
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
11
reference_url http://www.securitytracker.com/id?1024603
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024603
12
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
13
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=636386
reference_id 636386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=636386
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3477
reference_id CVE-2010-3477
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3477
28
reference_url https://access.redhat.com/errata/RHSA-2010:0779
reference_id RHSA-2010:0779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0779
29
reference_url https://access.redhat.com/errata/RHSA-2010:0839
reference_id RHSA-2010:0839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0839
30
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
31
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
32
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
33
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
34
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
35
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
36
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3477
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13jv-4raj-3bc6
1
url VCID-1bhm-5xj1-duh8
vulnerability_id VCID-1bhm-5xj1-duh8
summary kernel: L2TP send buffer allocation size overflows
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://openwall.com/lists/oss-security/2010/11/10/16
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/16
7
reference_url http://openwall.com/lists/oss-security/2010/11/10/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/5
8
reference_url http://openwall.com/lists/oss-security/2010/11/24/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/24/12
9
reference_url http://openwall.com/lists/oss-security/2010/11/24/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/24/4
10
reference_url http://openwall.com/lists/oss-security/2010/11/24/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/24/5
11
reference_url http://openwall.com/lists/oss-security/2010/11/24/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/24/6
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4160.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4160.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4160
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.36831
published_at 2026-04-26T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37077
published_at 2026-04-01T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37243
published_at 2026-04-02T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.3727
published_at 2026-04-04T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.371
published_at 2026-04-07T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37152
published_at 2026-04-08T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37166
published_at 2026-04-09T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37176
published_at 2026-04-11T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37142
published_at 2026-04-12T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37115
published_at 2026-04-13T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37162
published_at 2026-04-16T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37144
published_at 2026-04-18T12:55:00Z
12
value 0.00162
scoring_system epss
scoring_elements 0.37088
published_at 2026-04-21T12:55:00Z
13
value 0.00162
scoring_system epss
scoring_elements 0.36863
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4160
14
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
15
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
16
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
17
reference_url http://secunia.com/advisories/43056
reference_id
reference_type
scores
url http://secunia.com/advisories/43056
18
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
19
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
21
reference_url http://www.securityfocus.com/bid/44762
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44762
22
reference_url http://www.spinics.net/lists/netdev/msg145248.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145248.html
23
reference_url http://www.spinics.net/lists/netdev/msg145673.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145673.html
24
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
25
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
26
reference_url http://www.vupen.com/english/advisories/2011/0213
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0213
27
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
28
reference_url http://xorl.wordpress.com/2010/11/11/cve-2010-4160-linux-kernel-l2tp-integer-overflows/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2010/11/11/cve-2010-4160-linux-kernel-l2tp-integer-overflows/
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651892
reference_id 651892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651892
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4160
reference_id CVE-2010-4160
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4160
39
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
40
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
41
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
42
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
43
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
44
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
45
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
46
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
47
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
48
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4160
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bhm-5xj1-duh8
2
url VCID-1d5z-ugrh-s7bj
vulnerability_id VCID-1d5z-ugrh-s7bj
summary kernel: panic when submitting certain 0-length I/O requests
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://openwall.com/lists/oss-security/2010/11/10/18
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/18
6
reference_url http://openwall.com/lists/oss-security/2010/11/12/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/12/2
7
reference_url http://openwall.com/lists/oss-security/2010/11/29/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/29/1
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4163.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4163
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-26T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24088
published_at 2026-04-01T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24217
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-04T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24038
published_at 2026-04-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24107
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24152
published_at 2026-04-09T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.2417
published_at 2026-04-11T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24128
published_at 2026-04-12T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24071
published_at 2026-04-13T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24085
published_at 2026-04-16T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24072
published_at 2026-04-18T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.24055
published_at 2026-04-21T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.2393
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4163
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
17
reference_url http://www.securityfocus.com/bid/44793
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44793
18
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
19
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
20
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=652957
reference_id 652957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=652957
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4163
reference_id CVE-2010-4163
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4163
29
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
30
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
31
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
32
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
33
reference_url https://usn.ubuntu.com/1090-1/
reference_id USN-1090-1
reference_type
scores
url https://usn.ubuntu.com/1090-1/
34
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
35
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
36
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
37
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
38
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
39
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4163
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d5z-ugrh-s7bj
3
url VCID-2v2h-1vgg-qubq
vulnerability_id VCID-2v2h-1vgg-qubq
summary kernel: install_special_mapping skips security_file_mmap check
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
1
reference_url http://openwall.com/lists/oss-security/2010/12/09/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/09/12
2
reference_url http://openwall.com/lists/oss-security/2010/12/09/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/09/13
3
reference_url http://openwall.com/lists/oss-security/2010/12/10/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/10/2
4
reference_url http://openwall.com/lists/oss-security/2010/12/10/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/10/3
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4346.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4346
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12411
published_at 2026-04-26T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12439
published_at 2026-04-21T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12445
published_at 2026-04-24T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18122
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1806
published_at 2026-04-01T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-11T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18221
published_at 2026-04-02T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4346
7
reference_url http://secunia.com/advisories/42570
reference_id
reference_type
scores
url http://secunia.com/advisories/42570
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url https://lkml.org/lkml/2010/12/9/222
reference_id
reference_type
scores
url https://lkml.org/lkml/2010/12/9/222
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45323
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45323
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=662189
reference_id 662189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=662189
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4346
reference_id CVE-2010-4346
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4346
24
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
25
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
26
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
27
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
28
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
29
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
30
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
31
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
32
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
33
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
34
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4346
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2h-1vgg-qubq
4
url VCID-57xt-prud-ruga
vulnerability_id VCID-57xt-prud-ruga
summary kernel: possible kernel oops from user MSS
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4165.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4165.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4165
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41658
published_at 2026-04-26T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.4172
published_at 2026-04-01T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41785
published_at 2026-04-02T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41814
published_at 2026-04-04T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41743
published_at 2026-04-07T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41793
published_at 2026-04-12T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41802
published_at 2026-04-09T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41826
published_at 2026-04-11T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.4178
published_at 2026-04-13T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41829
published_at 2026-04-16T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41803
published_at 2026-04-18T12:55:00Z
11
value 0.00197
scoring_system epss
scoring_elements 0.41731
published_at 2026-04-21T12:55:00Z
12
value 0.00197
scoring_system epss
scoring_elements 0.41656
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4165
7
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
8
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
9
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
10
reference_url http://securityreason.com/securityalert/8111
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8111
11
reference_url http://securityreason.com/securityalert/8123
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8123
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
15
reference_url http://www.openwall.com/lists/oss-security/2010/11/12/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/12/1
16
reference_url http://www.openwall.com/lists/oss-security/2010/11/12/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/12/4
17
reference_url http://www.osvdb.org/69241
reference_id
reference_type
scores
url http://www.osvdb.org/69241
18
reference_url http://www.securityfocus.com/bid/44830
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44830
19
reference_url http://www.spinics.net/lists/netdev/msg146405.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146405.html
20
reference_url http://www.spinics.net/lists/netdev/msg146495.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146495.html
21
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
22
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
23
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=652508
reference_id 652508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=652508
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16263.c
reference_id CVE-2010-4165
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16263.c
34
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16952.c
reference_id CVE-2010-4165
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16952.c
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4165
reference_id CVE-2010-4165
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4165
36
reference_url https://access.redhat.com/errata/RHSA-2011:0283
reference_id RHSA-2011:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0283
37
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
38
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
39
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
40
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
41
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
42
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
43
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
44
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
45
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
fixed_packages
aliases CVE-2010-4165
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57xt-prud-ruga
5
url VCID-6x7p-5tt7-5fdv
vulnerability_id VCID-6x7p-5tt7-5fdv
summary kernel: missing tty ops write function presence check in hci_uart_tty_open()
references
0
reference_url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
reference_id
reference_type
scores
url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30055
published_at 2026-04-26T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30393
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30422
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30468
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30278
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30337
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30371
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.3033
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30283
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30297
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.3028
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30235
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.3017
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
4
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
10
reference_url https://lkml.org/lkml/2010/10/7/255
reference_id
reference_type
scores
url https://lkml.org/lkml/2010/10/7/255
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
14
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/45014
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45014
16
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
17
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
18
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
19
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
20
reference_url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=641410
reference_id 641410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=641410
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
reference_id CVE-2010-4242
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
24
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
27
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
28
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
29
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
30
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
35
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4242
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6x7p-5tt7-5fdv
6
url VCID-ccy6-xxzm-vbb4
vulnerability_id VCID-ccy6-xxzm-vbb4
summary kernel: iowarrior usb device heap overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4656
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14881
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14929
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15006
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14811
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.149
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.1495
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14915
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14877
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14818
published_at 2026-04-24T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14714
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14722
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14781
published_at 2026-04-21T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14817
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4656
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672420
reference_id 672420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672420
3
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
4
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
5
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
6
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
7
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
8
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
9
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
10
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
11
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4656
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccy6-xxzm-vbb4
7
url VCID-dg9k-nfvc-k7en
vulnerability_id VCID-dg9k-nfvc-k7en
summary kernel: orinoco: fix TKIP countermeasure behaviour
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4648
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45526
published_at 2026-04-01T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45602
published_at 2026-04-02T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45622
published_at 2026-04-04T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45569
published_at 2026-04-07T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45624
published_at 2026-04-13T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45623
published_at 2026-04-09T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45646
published_at 2026-04-11T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45616
published_at 2026-04-12T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45674
published_at 2026-04-16T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.4567
published_at 2026-04-18T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45619
published_at 2026-04-21T12:55:00Z
11
value 0.00228
scoring_system epss
scoring_elements 0.45532
published_at 2026-04-24T12:55:00Z
12
value 0.00228
scoring_system epss
scoring_elements 0.4554
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667907
reference_id 667907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667907
3
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
4
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
5
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
6
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
7
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
8
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
9
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4648
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dg9k-nfvc-k7en
8
url VCID-ek2s-wkm1-4ygb
vulnerability_id VCID-ek2s-wkm1-4ygb
summary kernel: bio: integer overflow page count when mapping/copying user data
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url http://openwall.com/lists/oss-security/2010/11/10/18
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/18
8
reference_url http://openwall.com/lists/oss-security/2010/11/12/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/12/2
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4162.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4162.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4162
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-26T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24088
published_at 2026-04-01T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24217
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-04T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24038
published_at 2026-04-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24107
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24152
published_at 2026-04-09T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.2417
published_at 2026-04-11T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24128
published_at 2026-04-12T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24071
published_at 2026-04-13T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24085
published_at 2026-04-16T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24072
published_at 2026-04-18T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.24055
published_at 2026-04-21T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.2393
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4162
11
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
12
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
15
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
16
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
19
reference_url http://www.securityfocus.com/bid/44793
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44793
20
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
21
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
22
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
23
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=652529
reference_id 652529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=652529
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4162
reference_id CVE-2010-4162
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4162
36
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
37
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
38
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
39
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
40
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
41
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
42
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
43
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
44
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
45
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4162
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek2s-wkm1-4ygb
9
url VCID-ewd8-ytvq-h7aw
vulnerability_id VCID-ewd8-ytvq-h7aw
summary kernel: local privilege escalation via /sys/kernel/debug/acpi/custom_method
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://openwall.com/lists/oss-security/2010/12/15/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/15/3
4
reference_url http://openwall.com/lists/oss-security/2010/12/15/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/15/7
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4347.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4347.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4347
reference_id
reference_type
scores
0
value 0.0594
scoring_system epss
scoring_elements 0.90665
published_at 2026-04-26T12:55:00Z
1
value 0.0594
scoring_system epss
scoring_elements 0.90591
published_at 2026-04-01T12:55:00Z
2
value 0.0594
scoring_system epss
scoring_elements 0.90595
published_at 2026-04-02T12:55:00Z
3
value 0.0594
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-04T12:55:00Z
4
value 0.0594
scoring_system epss
scoring_elements 0.90613
published_at 2026-04-07T12:55:00Z
5
value 0.0594
scoring_system epss
scoring_elements 0.90624
published_at 2026-04-08T12:55:00Z
6
value 0.0594
scoring_system epss
scoring_elements 0.9063
published_at 2026-04-09T12:55:00Z
7
value 0.0594
scoring_system epss
scoring_elements 0.90639
published_at 2026-04-12T12:55:00Z
8
value 0.0594
scoring_system epss
scoring_elements 0.90634
published_at 2026-04-13T12:55:00Z
9
value 0.0594
scoring_system epss
scoring_elements 0.90653
published_at 2026-04-16T12:55:00Z
10
value 0.0594
scoring_system epss
scoring_elements 0.90651
published_at 2026-04-18T12:55:00Z
11
value 0.0594
scoring_system epss
scoring_elements 0.90648
published_at 2026-04-21T12:55:00Z
12
value 0.0594
scoring_system epss
scoring_elements 0.90663
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4347
7
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64155
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64155
9
reference_url http://www.exploit-db.com/exploits/15774/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15774/
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
11
reference_url http://www.securityfocus.com/bid/45408
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45408
12
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
13
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=663542
reference_id 663542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=663542
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4347
reference_id CVE-2010-4347
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4347
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15774.c
reference_id CVE-2011-1021;OSVDB-70022;CVE-2010-4347
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15774.c
20
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
fixed_packages
aliases CVE-2010-4347
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewd8-ytvq-h7aw
10
url VCID-gwuw-j14j-dffw
vulnerability_id VCID-gwuw-j14j-dffw
summary kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10907
published_at 2026-04-26T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10909
published_at 2026-04-01T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11047
published_at 2026-04-02T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11109
published_at 2026-04-04T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-07T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11008
published_at 2026-04-08T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11061
published_at 2026-04-09T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11065
published_at 2026-04-11T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11033
published_at 2026-04-12T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11011
published_at 2026-04-13T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10865
published_at 2026-04-16T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10877
published_at 2026-04-18T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-21T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
3
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
8
reference_url http://www.openwall.com/lists/oss-security/2010/11/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/23/2
9
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/9
10
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45028
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45028
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656264
reference_id 656264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656264
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
reference_id CVE-2010-4248
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
21
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
22
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
23
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
24
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
25
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
26
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
27
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
28
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
29
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
30
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
31
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
32
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4248
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwuw-j14j-dffw
11
url VCID-k9ct-x12b-cfd6
vulnerability_id VCID-k9ct-x12b-cfd6
summary kernel: inotify memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4250
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.28003
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.28075
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.28117
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27912
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27979
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.2802
published_at 2026-04-09T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28023
published_at 2026-04-11T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2798
published_at 2026-04-12T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27922
published_at 2026-04-13T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27933
published_at 2026-04-16T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27915
published_at 2026-04-18T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27872
published_at 2026-04-21T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27787
published_at 2026-04-24T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4250
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656830
reference_id 656830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656830
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c
reference_id CVE-2010-4250;OSVDB-74644
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c
4
reference_url https://www.securityfocus.com/bid/45036/info
reference_id CVE-2010-4250;OSVDB-74644
reference_type exploit
scores
url https://www.securityfocus.com/bid/45036/info
5
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
6
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
7
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
8
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
9
reference_url https://usn.ubuntu.com/1394-1/
reference_id USN-1394-1
reference_type
scores
url https://usn.ubuntu.com/1394-1/
fixed_packages
aliases CVE-2010-4250
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9ct-x12b-cfd6
12
url VCID-mcdj-296n-1kc9
vulnerability_id VCID-mcdj-296n-1kc9
summary kernel: unix socket local dos
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lkml.org/lkml/2010/11/23/395
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/23/395
3
reference_url http://lkml.org/lkml/2010/11/23/450
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/23/450
4
reference_url http://lkml.org/lkml/2010/11/25/8
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/25/8
5
reference_url http://marc.info/?l=linux-netdev&m=129059035929046&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=129059035929046&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4249
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23987
published_at 2026-04-26T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.23998
published_at 2026-04-24T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25158
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24931
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24999
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25044
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25041
published_at 2026-04-01T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25018
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24977
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-18T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-21T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25058
published_at 2026-04-11T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.25118
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4249
8
reference_url http://secunia.com/advisories/42354
reference_id
reference_type
scores
url http://secunia.com/advisories/42354
9
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url http://www.exploit-db.com/exploits/15622/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15622/
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2
15
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/10
16
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/2
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/45037
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45037
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
23
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656756
reference_id 656756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656756
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4249
reference_id CVE-2010-4249
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4249
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c
reference_id CVE-2010-4249;OSVDB-69527
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c
32
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
33
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
34
reference_url https://access.redhat.com/errata/RHSA-2011:0303
reference_id RHSA-2011:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0303
35
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
36
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
37
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
38
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
39
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
40
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
41
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
42
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
43
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
44
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
fixed_packages
aliases CVE-2010-4249
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdj-296n-1kc9
13
url VCID-qraj-ye4g-8qdr
vulnerability_id VCID-qraj-ye4g-8qdr
summary kernel: CAN info leak
references
0
reference_url http://openwall.com/lists/oss-security/2010/11/03/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/03/3
1
reference_url http://openwall.com/lists/oss-security/2010/11/04/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/4
2
reference_url http://openwall.com/lists/oss-security/2010/12/20/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/20/2
3
reference_url http://openwall.com/lists/oss-security/2010/12/21/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/21/1
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4565.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4565
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25423
published_at 2026-04-26T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25601
published_at 2026-04-01T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25672
published_at 2026-04-02T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25713
published_at 2026-04-04T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25481
published_at 2026-04-07T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25554
published_at 2026-04-08T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25602
published_at 2026-04-09T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25613
published_at 2026-04-11T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25571
published_at 2026-04-12T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25515
published_at 2026-04-13T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.2552
published_at 2026-04-16T12:55:00Z
11
value 0.0009
scoring_system epss
scoring_elements 0.25504
published_at 2026-04-18T12:55:00Z
12
value 0.0009
scoring_system epss
scoring_elements 0.25472
published_at 2026-04-21T12:55:00Z
13
value 0.0009
scoring_system epss
scoring_elements 0.25431
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4565
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
7
reference_url http://www.securityfocus.com/bid/44661
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44661
8
reference_url http://www.spinics.net/lists/netdev/msg145791.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145791.html
9
reference_url http://www.spinics.net/lists/netdev/msg145796.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145796.html
10
reference_url http://www.spinics.net/lists/netdev/msg146270.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146270.html
11
reference_url http://www.spinics.net/lists/netdev/msg146468.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146468.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664544
reference_id 664544
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664544
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4565
reference_id CVE-2010-4565
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4565
15
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
16
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
17
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
18
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
19
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
20
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
21
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
22
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
23
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4565
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qraj-ye4g-8qdr
14
url VCID-uk6m-rq4u-nugy
vulnerability_id VCID-uk6m-rq4u-nugy
summary kernel: panic when submitting certain 0-length I/O requests
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5478755616ae2ef1ce144dded589b62b2a50d575
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5478755616ae2ef1ce144dded589b62b2a50d575
1
reference_url http://lkml.org/lkml/2010/11/29/68
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/29/68
2
reference_url http://lkml.org/lkml/2010/11/29/70
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/29/70
3
reference_url http://openwall.com/lists/oss-security/2010/11/29/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/29/1
4
reference_url http://openwall.com/lists/oss-security/2010/11/30/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/30/4
5
reference_url http://openwall.com/lists/oss-security/2010/11/30/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/30/7
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4668.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4668
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21055
published_at 2026-04-26T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21182
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21333
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21389
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21142
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21222
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21283
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21293
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21253
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.212
published_at 2026-04-13T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21192
published_at 2026-04-16T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21201
published_at 2026-04-18T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-21T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21051
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4668
8
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64496
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64496
10
reference_url https://patchwork.kernel.org/patch/363282/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/363282/
11
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc7
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc7
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.securityfocus.com/bid/45660
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45660
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=652957
reference_id 652957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=652957
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4668
reference_id CVE-2010-4668
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4668
24
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
25
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
26
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
27
reference_url https://usn.ubuntu.com/1090-1/
reference_id USN-1090-1
reference_type
scores
url https://usn.ubuntu.com/1090-1/
28
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
29
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
30
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
31
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
32
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4668
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uk6m-rq4u-nugy
15
url VCID-uxye-sz24-dqd4
vulnerability_id VCID-uxye-sz24-dqd4
summary kernel: av7110 negative array offset
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
1
reference_url http://openwall.com/lists/oss-security/2011/01/24/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/24/2
2
reference_url http://openwall.com/lists/oss-security/2011/01/25/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/25/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0521.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17116
published_at 2026-04-26T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17202
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.1737
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17416
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17196
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17359
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.1731
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17251
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17191
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17198
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17231
published_at 2026-04-21T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17136
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0521
5
reference_url http://secunia.com/advisories/43009
reference_id
reference_type
scores
url http://secunia.com/advisories/43009
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc2
9
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/45986
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45986
11
reference_url http://www.securitytracker.com/id?1025195
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025195
12
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672398
reference_id 672398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672398
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
reference_id CVE-2011-0521
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0521
18
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
19
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
20
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
21
reference_url https://access.redhat.com/errata/RHSA-2011:0429
reference_id RHSA-2011:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0429
22
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
23
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
24
reference_url https://usn.ubuntu.com/1133-1/
reference_id USN-1133-1
reference_type
scores
url https://usn.ubuntu.com/1133-1/
25
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
28
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
29
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2011-0521
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxye-sz24-dqd4
16
url VCID-xr4s-smmp-fubc
vulnerability_id VCID-xr4s-smmp-fubc
summary kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16642
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16814
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16872
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16656
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16741
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16795
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16774
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1673
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16672
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16609
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16616
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16655
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16558
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16547
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4655
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672428
reference_id 672428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672428
3
reference_url https://access.redhat.com/errata/RHSA-2011:0263
reference_id RHSA-2011:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0263
4
reference_url https://access.redhat.com/errata/RHSA-2011:0303
reference_id RHSA-2011:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0303
5
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
6
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
7
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
8
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
9
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
10
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
11
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
12
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4655
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4s-smmp-fubc
17
url VCID-ydtx-ae9c-eqah
vulnerability_id VCID-ydtx-ae9c-eqah
summary kernel: IB/uverbs: Handle large number of entries in poll CQ
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
1
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1044.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1044
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18195
published_at 2026-04-26T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18382
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.1853
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18585
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18292
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18375
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18428
published_at 2026-04-09T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18427
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18379
published_at 2026-04-12T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18328
published_at 2026-04-13T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18272
published_at 2026-04-16T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18284
published_at 2026-04-18T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18309
published_at 2026-04-21T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18211
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1044
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
5
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
6
reference_url http://www.securityfocus.com/bid/46488
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46488
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667916
reference_id 667916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667916
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1044
reference_id CVE-2011-1044
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1044
15
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
16
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
17
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
18
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
19
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
20
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
21
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
22
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
23
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
24
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
25
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2011-1044
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydtx-ae9c-eqah
18
url VCID-zumd-vknc-87ba
vulnerability_id VCID-zumd-vknc-87ba
summary kernel: IB/uverbs: Handle large number of entries in poll CQ
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
1
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4649.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4649
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21129
published_at 2026-04-26T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21262
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21418
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21472
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21224
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21304
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21366
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21334
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21281
published_at 2026-04-13T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21275
published_at 2026-04-16T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21284
published_at 2026-04-18T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.2126
published_at 2026-04-21T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4649
4
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
5
reference_url http://www.securityfocus.com/bid/46073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46073
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667916
reference_id 667916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667916
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4649
reference_id CVE-2010-4649
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4649
14
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
15
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
16
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
17
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
18
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
19
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
20
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
21
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
22
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
23
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
24
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4649
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zumd-vknc-87ba
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55%3Farch=el5rt