Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.18-238?arch=el5
Typerpm
Namespaceredhat
Namekernel
Version2.6.18-238
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1kqc-mk8b-qyew
vulnerability_id VCID-1kqc-mk8b-qyew
summary kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c
1
reference_url http://grsecurity.net/~spender/64bit_dos.c
reference_id
reference_type
scores
url http://grsecurity.net/~spender/64bit_dos.c
2
reference_url http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html
reference_id
reference_type
scores
url http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html
3
reference_url http://lkml.org/lkml/2010/8/27/429
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/27/429
4
reference_url http://lkml.org/lkml/2010/8/29/206
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/29/206
5
reference_url http://lkml.org/lkml/2010/8/30/138
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/30/138
6
reference_url http://lkml.org/lkml/2010/8/30/378
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/30/378
7
reference_url http://openwall.com/lists/oss-security/2010/11/22/15
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/22/15
8
reference_url http://openwall.com/lists/oss-security/2010/11/22/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/22/6
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4243.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4243.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4243
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36192
published_at 2026-04-29T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36503
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36678
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.3671
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36548
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.366
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36619
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36626
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36591
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36567
published_at 2026-04-13T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36612
published_at 2026-04-16T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36596
published_at 2026-04-18T12:55:00Z
12
value 0.00158
scoring_system epss
scoring_elements 0.36535
published_at 2026-04-21T12:55:00Z
13
value 0.00158
scoring_system epss
scoring_elements 0.36308
published_at 2026-04-24T12:55:00Z
14
value 0.00158
scoring_system epss
scoring_elements 0.36278
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4243
11
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64700
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64700
14
reference_url http://www.exploit-db.com/exploits/15619
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15619
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/45004
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45004
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625688
reference_id 625688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625688
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4243
reference_id CVE-2010-4243
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4243
23
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
24
reference_url https://access.redhat.com/errata/RHSA-2011:0283
reference_id RHSA-2011:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0283
25
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
26
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
27
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
28
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
29
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
30
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
31
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
32
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4243
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kqc-mk8b-qyew
1
url VCID-4trp-muyy-ufez
vulnerability_id VCID-4trp-muyy-ufez
summary kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url http://lkml.org/lkml/2010/9/11/170
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/11/170
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3296.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3296
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-29T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26904
published_at 2026-04-01T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26944
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.2698
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26886
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.2689
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26845
published_at 2026-04-12T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-13T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26796
published_at 2026-04-16T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26768
published_at 2026-04-18T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26729
published_at 2026-04-21T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26673
published_at 2026-04-24T12:55:00Z
14
value 0.00097
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3296
7
reference_url http://secunia.com/advisories/41440
reference_id
reference_type
scores
url http://secunia.com/advisories/41440
8
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
9
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
10
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
11
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
13
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/2
14
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/7
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/43221
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43221
18
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
21
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=633149
reference_id 633149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=633149
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3296
reference_id CVE-2010-3296
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3296
40
reference_url https://access.redhat.com/errata/RHSA-2010:0771
reference_id RHSA-2010:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0771
41
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
42
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
43
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
44
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
45
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
46
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
47
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
48
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
49
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3296
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4trp-muyy-ufez
2
url VCID-519v-6b9u-dygr
vulnerability_id VCID-519v-6b9u-dygr
summary kernel: drivers/serial/serial_core.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
1
reference_url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
reference_id
reference_type
scores
url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
4
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
9
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/43806
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43806
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648660
reference_id 648660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648660
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
reference_id CVE-2010-4075
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
24
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
27
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
28
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
29
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
30
reference_url https://usn.ubuntu.com/1090-1/
reference_id USN-1090-1
reference_type
scores
url https://usn.ubuntu.com/1090-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
35
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
36
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4075
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-519v-6b9u-dygr
3
url VCID-5x5t-fnw6-kqea
vulnerability_id VCID-5x5t-fnw6-kqea
summary kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lkml.org/lkml/2010/9/25/41
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/25/41
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
14
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
16
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
17
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
18
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
24
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/45058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45058
26
reference_url http://www.securityfocus.com/bid/45063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45063
27
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
28
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
29
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
30
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648669
reference_id 648669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648669
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
reference_id CVE-2010-4080
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
52
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
53
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
54
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4080
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x5t-fnw6-kqea
4
url VCID-643a-mvrh-bbap
vulnerability_id VCID-643a-mvrh-bbap
summary kernel: ipc/compat*.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/492
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/492
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49495
published_at 2026-04-29T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49475
published_at 2026-04-01T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49504
published_at 2026-04-02T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49531
published_at 2026-04-04T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49484
published_at 2026-04-07T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49539
published_at 2026-04-08T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49534
published_at 2026-04-09T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49552
published_at 2026-04-11T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49523
published_at 2026-04-12T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49525
published_at 2026-04-13T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49572
published_at 2026-04-16T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49569
published_at 2026-04-18T12:55:00Z
12
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-26T12:55:00Z
13
value 0.00262
scoring_system epss
scoring_elements 0.4953
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
13
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://securityreason.com/securityalert/8366
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8366
17
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
18
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/45073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45073
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
32
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
33
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
34
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648658
reference_id 648658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648658
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
reference_id CVE-2010-4073
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
52
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
53
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
54
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4073
risk_score 3.4
exploitability 2.0
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-643a-mvrh-bbap
5
url VCID-cw6b-qbau-hbh7
vulnerability_id VCID-cw6b-qbau-hbh7
summary kernel: igb panics when receiving tag vlan packet
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=31b24b955c3ebbb6f3008a6374e61cf7c05a193c
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=31b24b955c3ebbb6f3008a6374e61cf7c05a193c
1
reference_url http://openwall.com/lists/oss-security/2010/12/06/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/06/3
2
reference_url http://openwall.com/lists/oss-security/2010/12/06/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/06/9
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4263.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4263.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4263
reference_id
reference_type
scores
0
value 0.05083
scoring_system epss
scoring_elements 0.89827
published_at 2026-04-29T12:55:00Z
1
value 0.05083
scoring_system epss
scoring_elements 0.89764
published_at 2026-04-01T12:55:00Z
2
value 0.05083
scoring_system epss
scoring_elements 0.89766
published_at 2026-04-02T12:55:00Z
3
value 0.05083
scoring_system epss
scoring_elements 0.89781
published_at 2026-04-04T12:55:00Z
4
value 0.05083
scoring_system epss
scoring_elements 0.89785
published_at 2026-04-07T12:55:00Z
5
value 0.05083
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-08T12:55:00Z
6
value 0.05083
scoring_system epss
scoring_elements 0.89808
published_at 2026-04-09T12:55:00Z
7
value 0.05083
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-11T12:55:00Z
8
value 0.05083
scoring_system epss
scoring_elements 0.89813
published_at 2026-04-12T12:55:00Z
9
value 0.05083
scoring_system epss
scoring_elements 0.89806
published_at 2026-04-13T12:55:00Z
10
value 0.05083
scoring_system epss
scoring_elements 0.89819
published_at 2026-04-16T12:55:00Z
11
value 0.05083
scoring_system epss
scoring_elements 0.8982
published_at 2026-04-18T12:55:00Z
12
value 0.05083
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-21T12:55:00Z
13
value 0.05083
scoring_system epss
scoring_elements 0.89828
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4263
5
reference_url https://bugzilla.kernel.org/show_bug.cgi?id=15582
reference_id
reference_type
scores
url https://bugzilla.kernel.org/show_bug.cgi?id=15582
6
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
7
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
10
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45208
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45208
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=660188
reference_id 660188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=660188
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4263
reference_id CVE-2010-4263
reference_type
scores
0
value 7.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4263
41
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
42
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
43
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
44
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
45
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
fixed_packages
aliases CVE-2010-4263
risk_score 3.5
exploitability 0.5
weighted_severity 7.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cw6b-qbau-hbh7
6
url VCID-dnya-sfdj-vbee
vulnerability_id VCID-dnya-sfdj-vbee
summary kernel: net/tipc/socket.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52
1
reference_url http://marc.info/?l=linux-netdev&m=128854507420917&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128854507420917&w=2
2
reference_url http://openwall.com/lists/oss-security/2010/11/02/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/7
3
reference_url http://openwall.com/lists/oss-security/2010/11/04/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/5
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3877.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3877.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3877
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28745
published_at 2026-04-29T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29139
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29213
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29266
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.2908
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29143
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29185
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29191
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29145
published_at 2026-04-12T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29092
published_at 2026-04-13T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29119
published_at 2026-04-16T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29096
published_at 2026-04-18T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29049
published_at 2026-04-21T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.28929
published_at 2026-04-24T12:55:00Z
14
value 0.00108
scoring_system epss
scoring_elements 0.28816
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3877
6
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64578
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64578
9
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
13
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/44630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44630
15
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=649717
reference_id 649717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=649717
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3877
reference_id CVE-2010-3877
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3877
22
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
23
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
24
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
25
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
26
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
27
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
28
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
29
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
30
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
31
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3877
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnya-sfdj-vbee
7
url VCID-f744-pabt-7ffu
vulnerability_id VCID-f744-pabt-7ffu
summary kernel: socket filters infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
reference_id
reference_type
scores
0
value 0.00199
scoring_system epss
scoring_elements 0.41788
published_at 2026-04-29T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.41939
published_at 2026-04-01T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.42
published_at 2026-04-02T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.42028
published_at 2026-04-04T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.41954
published_at 2026-04-07T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.42005
published_at 2026-04-08T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42016
published_at 2026-04-09T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42038
published_at 2026-04-11T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-12T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.41987
published_at 2026-04-13T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42035
published_at 2026-04-16T12:55:00Z
11
value 0.00199
scoring_system epss
scoring_elements 0.42009
published_at 2026-04-18T12:55:00Z
12
value 0.00199
scoring_system epss
scoring_elements 0.41938
published_at 2026-04-21T12:55:00Z
13
value 0.00199
scoring_system epss
scoring_elements 0.41878
published_at 2026-04-24T12:55:00Z
14
value 0.00199
scoring_system epss
scoring_elements 0.4187
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
11
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
12
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
15
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
16
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
17
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
18
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/514705
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514705
27
reference_url http://www.securityfocus.com/archive/1/514845
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514845
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44758
30
reference_url http://www.spinics.net/lists/netdev/msg146361.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146361.html
31
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651698
reference_id 651698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651698
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
reference_id CVE-2010-4158
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
51
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
52
reference_url https://www.securityfocus.com/bid/44758/info
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://www.securityfocus.com/bid/44758/info
53
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
54
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
55
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
56
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
57
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
60
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
61
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
62
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
63
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
64
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
65
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4158
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f744-pabt-7ffu
8
url VCID-j4jr-x4gq-gyex
vulnerability_id VCID-j4jr-x4gq-gyex
summary kernel: bfa driver sysfs crash
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4343.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4343.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4343
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.21838
published_at 2026-04-29T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21852
published_at 2026-04-26T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22018
published_at 2026-04-01T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22176
published_at 2026-04-02T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-04T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22007
published_at 2026-04-07T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22088
published_at 2026-04-08T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22143
published_at 2026-04-09T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22161
published_at 2026-04-11T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.2212
published_at 2026-04-12T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.2206
published_at 2026-04-13T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22059
published_at 2026-04-16T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22052
published_at 2026-04-18T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.22005
published_at 2026-04-21T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.21864
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4343
3
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
4
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
5
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
6
reference_url http://www.openwall.com/lists/oss-security/2010/12/08/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/12/08/3
7
reference_url http://www.openwall.com/lists/oss-security/2010/12/09/15
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/12/09/15
8
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
9
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/45262
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45262
11
reference_url http://www.spinics.net/lists/linux-scsi/msg43772.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-scsi/msg43772.html
12
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=661182
reference_id 661182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=661182
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4343
reference_id CVE-2010-4343
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4343
18
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
19
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
20
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
21
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-4343
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4jr-x4gq-gyex
9
url VCID-nq55-xn3b-8qdm
vulnerability_id VCID-nq55-xn3b-8qdm
summary kernel: ipc/shm.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/454
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/454
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2133
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21493
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21663
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21721
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21474
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.2161
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21622
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21585
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21528
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21525
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21533
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21501
published_at 2026-04-21T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21355
published_at 2026-04-24T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.21352
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
9
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
14
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
15
reference_url http://secunia.com/advisories/43161
reference_id
reference_type
scores
url http://secunia.com/advisories/43161
16
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
17
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
18
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
19
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
23
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/45054
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45054
30
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
31
reference_url http://www.ubuntu.com/usn/USN-1057-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1057-1
32
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
35
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
36
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
37
reference_url http://www.vupen.com/english/advisories/2011/0280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0280
38
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
39
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648656
reference_id 648656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648656
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
reference_id CVE-2010-4072
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
57
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
58
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
59
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
60
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
61
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
62
reference_url https://usn.ubuntu.com/1057-1/
reference_id USN-1057-1
reference_type
scores
url https://usn.ubuntu.com/1057-1/
63
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
64
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
65
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
66
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
67
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
68
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-4072
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nq55-xn3b-8qdm
10
url VCID-nub2-qpm7-n7gv
vulnerability_id VCID-nub2-qpm7-n7gv
summary kernel: drivers/sound/pci/rme9652/hdspm.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/9/25/41
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/25/41
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4081.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4081.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4081
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4081
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
11
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
14
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
15
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
16
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
17
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
18
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
20
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
23
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
24
reference_url http://www.securityfocus.com/bid/45063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45063
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
26
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
27
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
28
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648670
reference_id 648670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648670
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4081
reference_id CVE-2010-4081
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4081
46
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
47
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
48
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
49
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
50
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
51
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
52
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
53
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
54
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
55
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4081
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nub2-qpm7-n7gv
11
url VCID-t6vx-kxne-k7bw
vulnerability_id VCID-t6vx-kxne-k7bw
summary xen: 64-bit PV xen guest can crash host by accessing hypervisor per-domain memory area
references
0
reference_url http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
reference_id
reference_type
scores
url http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
1
reference_url http://openwall.com/lists/oss-security/2010/11/30/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/30/5
2
reference_url http://openwall.com/lists/oss-security/2010/11/30/8
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/30/8
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4255.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4255.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4255
reference_id
reference_type
scores
0
value 0.00819
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-29T12:55:00Z
1
value 0.00819
scoring_system epss
scoring_elements 0.7432
published_at 2026-04-01T12:55:00Z
2
value 0.00819
scoring_system epss
scoring_elements 0.74324
published_at 2026-04-07T12:55:00Z
3
value 0.00819
scoring_system epss
scoring_elements 0.74351
published_at 2026-04-04T12:55:00Z
4
value 0.00819
scoring_system epss
scoring_elements 0.74358
published_at 2026-04-08T12:55:00Z
5
value 0.00819
scoring_system epss
scoring_elements 0.74373
published_at 2026-04-09T12:55:00Z
6
value 0.00819
scoring_system epss
scoring_elements 0.74394
published_at 2026-04-11T12:55:00Z
7
value 0.00819
scoring_system epss
scoring_elements 0.74374
published_at 2026-04-12T12:55:00Z
8
value 0.00819
scoring_system epss
scoring_elements 0.74365
published_at 2026-04-13T12:55:00Z
9
value 0.00819
scoring_system epss
scoring_elements 0.74402
published_at 2026-04-16T12:55:00Z
10
value 0.00819
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-18T12:55:00Z
11
value 0.00819
scoring_system epss
scoring_elements 0.74403
published_at 2026-04-21T12:55:00Z
12
value 0.00819
scoring_system epss
scoring_elements 0.74436
published_at 2026-04-24T12:55:00Z
13
value 0.00819
scoring_system epss
scoring_elements 0.74444
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4255
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4255
6
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
9
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
10
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609531
reference_id 609531
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609531
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=658155
reference_id 658155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=658155
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4255
reference_id CVE-2010-4255
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4255
33
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
fixed_packages
aliases CVE-2010-4255
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6vx-kxne-k7bw
12
url VCID-v72v-tzmz-6kb6
vulnerability_id VCID-v72v-tzmz-6kb6
summary kernel: Xen Dom0 crash with Windows 2008 R2 64bit DomU + GPLPV
references
0
reference_url http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517
reference_id
reference_type
scores
url http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4238.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4238.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4238
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60399
published_at 2026-04-29T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60248
published_at 2026-04-01T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60324
published_at 2026-04-02T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60351
published_at 2026-04-04T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60319
published_at 2026-04-07T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60369
published_at 2026-04-08T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60385
published_at 2026-04-09T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60405
published_at 2026-04-11T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60391
published_at 2026-04-12T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60372
published_at 2026-04-13T12:55:00Z
10
value 0.00395
scoring_system epss
scoring_elements 0.60412
published_at 2026-04-16T12:55:00Z
11
value 0.00395
scoring_system epss
scoring_elements 0.60421
published_at 2026-04-18T12:55:00Z
12
value 0.00395
scoring_system epss
scoring_elements 0.60413
published_at 2026-04-21T12:55:00Z
13
value 0.00395
scoring_system epss
scoring_elements 0.60395
published_at 2026-04-24T12:55:00Z
14
value 0.00395
scoring_system epss
scoring_elements 0.6041
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4238
3
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
4
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64698
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64698
6
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
7
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/45795
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45795
9
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=655623
reference_id 655623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=655623
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4238
reference_id CVE-2010-4238
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4238
15
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
16
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
fixed_packages
aliases CVE-2010-4238
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v72v-tzmz-6kb6
Fixing_vulnerabilities
Risk_score8.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238%3Farch=el5