Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/hplip@3.9.8-33.el6_0?arch=1
Typerpm
Namespaceredhat
Namehplip
Version3.9.8-33.el6_0
Qualifiers
arch 1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-mfqk-y4g4-sfa5
vulnerability_id VCID-mfqk-y4g4-sfa5
summary
Multiple vulnerabilities have been found in HPLIP, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
4
reference_url http://osvdb.org/70498
reference_id
reference_type
scores
url http://osvdb.org/70498
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4267
reference_id
reference_type
scores
0
value 0.10217
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-21T12:55:00Z
1
value 0.10217
scoring_system epss
scoring_elements 0.9311
published_at 2026-04-01T12:55:00Z
2
value 0.10217
scoring_system epss
scoring_elements 0.93119
published_at 2026-04-02T12:55:00Z
3
value 0.10217
scoring_system epss
scoring_elements 0.93123
published_at 2026-04-04T12:55:00Z
4
value 0.10217
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-07T12:55:00Z
5
value 0.10217
scoring_system epss
scoring_elements 0.9313
published_at 2026-04-08T12:55:00Z
6
value 0.10217
scoring_system epss
scoring_elements 0.93135
published_at 2026-04-09T12:55:00Z
7
value 0.10217
scoring_system epss
scoring_elements 0.9314
published_at 2026-04-11T12:55:00Z
8
value 0.10217
scoring_system epss
scoring_elements 0.93137
published_at 2026-04-12T12:55:00Z
9
value 0.10217
scoring_system epss
scoring_elements 0.93139
published_at 2026-04-13T12:55:00Z
10
value 0.10217
scoring_system epss
scoring_elements 0.93155
published_at 2026-04-16T12:55:00Z
11
value 0.10217
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4267
7
reference_url https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff
reference_id
reference_type
scores
url https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
9
reference_url http://secunia.com/advisories/42939
reference_id
reference_type
scores
url http://secunia.com/advisories/42939
10
reference_url http://secunia.com/advisories/42956
reference_id
reference_type
scores
url http://secunia.com/advisories/42956
11
reference_url http://secunia.com/advisories/43022
reference_id
reference_type
scores
url http://secunia.com/advisories/43022
12
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
13
reference_url http://secunia.com/advisories/43083
reference_id
reference_type
scores
url http://secunia.com/advisories/43083
14
reference_url http://secunia.com/advisories/43102
reference_id
reference_type
scores
url http://secunia.com/advisories/43102
15
reference_url http://secunia.com/advisories/48441
reference_id
reference_type
scores
url http://secunia.com/advisories/48441
16
reference_url http://security.gentoo.org/glsa/glsa-201203-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201203-17.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64738
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64738
18
reference_url http://www.debian.org/security/2011/dsa-2152
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2152
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:013
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0154.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0154.html
21
reference_url http://www.securityfocus.com/bid/45833
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45833
22
reference_url http://www.securitytracker.com/id?1024967
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024967
23
reference_url http://www.ubuntu.com/usn/USN-1051-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1051-1
24
reference_url http://www.vupen.com/english/advisories/2011/0136
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0136
25
reference_url http://www.vupen.com/english/advisories/2011/0160
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0160
26
reference_url http://www.vupen.com/english/advisories/2011/0211
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0211
27
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
28
reference_url http://www.vupen.com/english/advisories/2011/0228
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0228
29
reference_url http://www.vupen.com/english/advisories/2011/0243
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0243
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960
reference_id 610960
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=662740
reference_id 662740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=662740
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4267
reference_id CVE-2010-4267
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4267
36
reference_url https://security.gentoo.org/glsa/201203-17
reference_id GLSA-201203-17
reference_type
scores
url https://security.gentoo.org/glsa/201203-17
37
reference_url https://access.redhat.com/errata/RHSA-2011:0154
reference_id RHSA-2011:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0154
38
reference_url https://usn.ubuntu.com/1051-1/
reference_id USN-1051-1
reference_type
scores
url https://usn.ubuntu.com/1051-1/
fixed_packages
aliases CVE-2010-4267
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfqk-y4g4-sfa5
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hplip@3.9.8-33.el6_0%3Farch=1