Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.18-194.32.1?arch=el5
Typerpm
Namespaceredhat
Namekernel
Version2.6.18-194.32.1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2m8w-7whg-jube
vulnerability_id VCID-2m8w-7whg-jube
summary kernel: logic error in INET_DIAG bytecode auditing
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
1
reference_url http://openwall.com/lists/oss-security/2010/11/04/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/9
2
reference_url http://openwall.com/lists/oss-security/2010/11/05/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/05/3
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3880
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31671
published_at 2026-04-29T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-01T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32184
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32222
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32048
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32099
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32127
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32132
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32093
published_at 2026-04-12T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32062
published_at 2026-04-13T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32096
published_at 2026-04-16T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32073
published_at 2026-04-18T12:55:00Z
12
value 0.00127
scoring_system epss
scoring_elements 0.32046
published_at 2026-04-21T12:55:00Z
13
value 0.00127
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-24T12:55:00Z
14
value 0.00127
scoring_system epss
scoring_elements 0.31754
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3880
5
reference_url http://secunia.com/advisories/42126
reference_id
reference_type
scores
url http://secunia.com/advisories/42126
6
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
7
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
14
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/44665
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44665
16
reference_url http://www.spinics.net/lists/netdev/msg145899.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145899.html
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
18
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651264
reference_id 651264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651264
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3880
reference_id CVE-2010-3880
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3880
25
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
26
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
27
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
28
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
29
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
30
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
31
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
32
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
33
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
34
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
35
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
36
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
37
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3880
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m8w-7whg-jube
1
url VCID-381s-khqd-muhz
vulnerability_id VCID-381s-khqd-muhz
summary kernel: iovec integer overflow in net/rds/rdma.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3865.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3865.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3865
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21465
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21518
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21272
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21351
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21412
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.2142
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2138
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21326
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21321
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21329
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21303
published_at 2026-04-21T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21168
published_at 2026-04-24T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.2117
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3865
6
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
7
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
8
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
9
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
10
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/62881
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/62881
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/29/1
13
reference_url http://www.openwall.com/lists/oss-security/2010/11/01/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/01/1
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/44549
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44549
18
reference_url http://www.spinics.net/lists/netdev/msg145359.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145359.html
19
reference_url http://www.spinics.net/lists/netdev/msg145397.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145397.html
20
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
21
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
22
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
23
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=647416
reference_id 647416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=647416
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3865
reference_id CVE-2010-3865
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3865
31
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
32
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
33
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
34
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
35
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
36
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
37
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
38
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
39
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
40
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3865
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-381s-khqd-muhz
2
url VCID-3hpq-y376-k3cd
vulnerability_id VCID-3hpq-y376-k3cd
summary kernel: rhel5 commit 6865201191 caused deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4161
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30545
published_at 2026-04-29T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.30934
published_at 2026-04-01T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31062
published_at 2026-04-02T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.31109
published_at 2026-04-04T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30925
published_at 2026-04-07T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.30982
published_at 2026-04-08T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31011
published_at 2026-04-09T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31017
published_at 2026-04-11T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30974
published_at 2026-04-12T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30928
published_at 2026-04-13T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-16T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.30939
published_at 2026-04-18T12:55:00Z
12
value 0.0012
scoring_system epss
scoring_elements 0.30905
published_at 2026-04-21T12:55:00Z
13
value 0.0012
scoring_system epss
scoring_elements 0.30745
published_at 2026-04-24T12:55:00Z
14
value 0.0012
scoring_system epss
scoring_elements 0.30628
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4161
2
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
3
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64497
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64497
5
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
6
reference_url http://www.securityfocus.com/archive/1/514845
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514845
7
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
8
reference_url http://www.spinics.net/lists/netdev/msg146404.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146404.html
9
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
10
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=652534
reference_id 652534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=652534
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4161
reference_id CVE-2010-4161
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4161
15
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
fixed_packages
aliases CVE-2010-4161
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hpq-y376-k3cd
3
url VCID-6x7p-5tt7-5fdv
vulnerability_id VCID-6x7p-5tt7-5fdv
summary kernel: missing tty ops write function presence check in hci_uart_tty_open()
references
0
reference_url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
reference_id
reference_type
scores
url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.2998
published_at 2026-04-29T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30393
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30422
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30468
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30278
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30337
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30371
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.3033
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30283
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30297
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.3028
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30235
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.3017
published_at 2026-04-24T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.30055
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
4
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
10
reference_url https://lkml.org/lkml/2010/10/7/255
reference_id
reference_type
scores
url https://lkml.org/lkml/2010/10/7/255
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
14
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/45014
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45014
16
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
17
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
18
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
19
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
20
reference_url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=641410
reference_id 641410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=641410
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
reference_id CVE-2010-4242
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
24
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
27
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
28
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
29
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
30
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
35
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4242
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6x7p-5tt7-5fdv
4
url VCID-8fkd-5ked-xyes
vulnerability_id VCID-8fkd-5ked-xyes
summary kernel: prevent heap corruption in snd_ctl_new()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38744
published_at 2026-04-29T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.3897
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39156
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39178
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39152
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39125
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39148
published_at 2026-04-18T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.3906
published_at 2026-04-21T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.3885
published_at 2026-04-24T12:55:00Z
13
value 0.00176
scoring_system epss
scoring_elements 0.38827
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
9
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
10
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
11
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
12
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
17
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
19
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/2
20
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/3
21
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/4
22
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/9
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/43787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43787
29
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
35
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
36
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638478
reference_id 638478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638478
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
reference_id CVE-2010-3442
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
60
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
61
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
62
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
63
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
64
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
65
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
66
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
67
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
68
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3442
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkd-5ked-xyes
5
url VCID-gwuw-j14j-dffw
vulnerability_id VCID-gwuw-j14j-dffw
summary kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.1084
published_at 2026-04-29T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10909
published_at 2026-04-01T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11047
published_at 2026-04-02T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11109
published_at 2026-04-04T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-07T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11008
published_at 2026-04-08T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11061
published_at 2026-04-09T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11065
published_at 2026-04-11T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11033
published_at 2026-04-12T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11011
published_at 2026-04-13T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10865
published_at 2026-04-16T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10877
published_at 2026-04-18T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-21T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-24T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10907
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
3
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
8
reference_url http://www.openwall.com/lists/oss-security/2010/11/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/23/2
9
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/9
10
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45028
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45028
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656264
reference_id 656264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656264
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
reference_id CVE-2010-4248
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
21
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
22
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
23
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
24
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
25
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
26
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
27
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
28
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
29
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
30
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
31
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
32
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4248
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwuw-j14j-dffw
6
url VCID-m6hm-2cau-4fdg
vulnerability_id VCID-m6hm-2cau-4fdg
summary kernel: net/packet/af_packet.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
1
reference_url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
2
reference_url http://openwall.com/lists/oss-security/2010/11/02/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/10
3
reference_url http://openwall.com/lists/oss-security/2010/11/02/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/12
4
reference_url http://openwall.com/lists/oss-security/2010/11/02/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/7
5
reference_url http://openwall.com/lists/oss-security/2010/11/02/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/9
6
reference_url http://openwall.com/lists/oss-security/2010/11/04/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/5
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17869
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1806
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18221
published_at 2026-04-02T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-04T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-07T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18122
published_at 2026-04-09T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-11T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-12T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-13T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-16T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-18T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18021
published_at 2026-04-21T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-24T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.17904
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/44630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44630
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
23
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=649715
reference_id 649715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=649715
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
reference_id CVE-2010-3876
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
37
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
38
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
39
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
40
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
41
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
42
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
43
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
44
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
45
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
46
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
47
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
48
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
49
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
50
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3876
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hm-2cau-4fdg
7
url VCID-nej4-chcw-fqah
vulnerability_id VCID-nej4-chcw-fqah
summary kernel: ipc/sem.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2475
published_at 2026-04-29T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25032
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25071
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24846
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24961
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24976
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24936
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24881
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24894
published_at 2026-04-16T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-18T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24865
published_at 2026-04-21T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24809
published_at 2026-04-24T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24796
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
14
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
15
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
16
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
18
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
20
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/43809
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43809
28
reference_url http://www.spinics.net/lists/mm-commits/msg80234.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/mm-commits/msg80234.html
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
32
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
33
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
34
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
35
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648673
reference_id 648673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648673
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
reference_id CVE-2010-4083
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
48
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
49
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
50
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
51
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
52
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
53
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
54
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
55
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
56
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
57
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
58
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
59
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
60
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4083
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nej4-chcw-fqah
8
url VCID-q4p1-vxct-cybq
vulnerability_id VCID-q4p1-vxct-cybq
summary kernel: tipc: heap overflow in tipc_msg_build()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
2
reference_url http://marc.info/?l=linux-netdev&m=128770476511716&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128770476511716&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3859
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34656
published_at 2026-04-29T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.34898
published_at 2026-04-01T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-02T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35124
published_at 2026-04-04T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35002
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35047
published_at 2026-04-08T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35075
published_at 2026-04-09T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35079
published_at 2026-04-11T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35044
published_at 2026-04-12T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35058
published_at 2026-04-16T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35043
published_at 2026-04-18T12:55:00Z
12
value 0.00146
scoring_system epss
scoring_elements 0.34997
published_at 2026-04-21T12:55:00Z
13
value 0.00146
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-24T12:55:00Z
14
value 0.00146
scoring_system epss
scoring_elements 0.34747
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3859
5
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/2
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/5
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/44354
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44354
17
reference_url http://www.spinics.net/lists/netdev/msg145247.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145247.html
18
reference_url http://www.spinics.net/lists/netdev/msg145248.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145248.html
19
reference_url http://www.spinics.net/lists/netdev/msg145262.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145262.html
20
reference_url http://www.spinics.net/lists/netdev/msg145263.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145263.html
21
reference_url http://www.spinics.net/lists/netdev/msg145264.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145264.html
22
reference_url http://www.spinics.net/lists/netdev/msg145265.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145265.html
23
reference_url http://www.spinics.net/lists/netdev/msg145352.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145352.html
24
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
25
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
26
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645867
reference_id 645867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645867
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3859
reference_id CVE-2010-3859
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3859
31
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
32
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
33
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
34
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
35
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
36
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
37
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
38
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
39
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
40
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-3859
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4p1-vxct-cybq
9
url VCID-qx2w-etz4-kybx
vulnerability_id VCID-qx2w-etz4-kybx
summary xen: request-processing loop is unbounded in blkback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4247.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4247
reference_id
reference_type
scores
0
value 0.00615
scoring_system epss
scoring_elements 0.69984
published_at 2026-04-29T12:55:00Z
1
value 0.00615
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-01T12:55:00Z
2
value 0.00615
scoring_system epss
scoring_elements 0.69841
published_at 2026-04-02T12:55:00Z
3
value 0.00615
scoring_system epss
scoring_elements 0.69856
published_at 2026-04-04T12:55:00Z
4
value 0.00615
scoring_system epss
scoring_elements 0.69833
published_at 2026-04-07T12:55:00Z
5
value 0.00615
scoring_system epss
scoring_elements 0.69881
published_at 2026-04-08T12:55:00Z
6
value 0.00615
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-09T12:55:00Z
7
value 0.00615
scoring_system epss
scoring_elements 0.6992
published_at 2026-04-11T12:55:00Z
8
value 0.00615
scoring_system epss
scoring_elements 0.69905
published_at 2026-04-12T12:55:00Z
9
value 0.00615
scoring_system epss
scoring_elements 0.69891
published_at 2026-04-13T12:55:00Z
10
value 0.00615
scoring_system epss
scoring_elements 0.69932
published_at 2026-04-16T12:55:00Z
11
value 0.00615
scoring_system epss
scoring_elements 0.69941
published_at 2026-04-18T12:55:00Z
12
value 0.00615
scoring_system epss
scoring_elements 0.69923
published_at 2026-04-21T12:55:00Z
13
value 0.00615
scoring_system epss
scoring_elements 0.69974
published_at 2026-04-24T12:55:00Z
14
value 0.00615
scoring_system epss
scoring_elements 0.69983
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4247
2
reference_url http://secunia.com/advisories/35093
reference_id
reference_type
scores
url http://secunia.com/advisories/35093
3
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
4
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
5
reference_url http://www.openwall.com/lists/oss-security/2010/11/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/23/1
6
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/8
7
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
8
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/45029
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45029
10
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
11
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
12
reference_url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c
reference_id
reference_type
scores
url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c
13
reference_url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d
reference_id
reference_type
scores
url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656206
reference_id 656206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656206
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4247
reference_id CVE-2010-4247
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4247
29
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
30
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
fixed_packages
aliases CVE-2010-4247
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx2w-etz4-kybx
10
url VCID-t5zj-36y8-bbdt
vulnerability_id VCID-t5zj-36y8-bbdt
summary kernel: setup_arg_pages: diagnose excessive argument size
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583
1
reference_url http://grsecurity.net/~spender/64bit_dos.c
reference_id
reference_type
scores
url http://grsecurity.net/~spender/64bit_dos.c
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3858
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.34909
published_at 2026-04-29T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35159
published_at 2026-04-01T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35359
published_at 2026-04-02T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35386
published_at 2026-04-04T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35268
published_at 2026-04-07T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35314
published_at 2026-04-08T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35339
published_at 2026-04-09T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35341
published_at 2026-04-11T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35304
published_at 2026-04-12T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35281
published_at 2026-04-13T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.3532
published_at 2026-04-16T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35307
published_at 2026-04-18T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.35254
published_at 2026-04-21T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-24T12:55:00Z
14
value 0.00148
scoring_system epss
scoring_elements 0.34999
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3858
4
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
5
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
8
reference_url http://www.exploit-db.com/exploits/15619
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15619
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/21/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/21/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/4
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/44301
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44301
17
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
18
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
19
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
20
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645222
reference_id 645222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645222
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3858
reference_id CVE-2010-3858
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3858
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c
reference_id CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c
29
reference_url https://www.securityfocus.com/bid/44301/info
reference_id CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551
reference_type exploit
scores
url https://www.securityfocus.com/bid/44301/info
30
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
31
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
32
reference_url https://access.redhat.com/errata/RHSA-2011:0836
reference_id RHSA-2011:0836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0836
33
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
34
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
35
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
36
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
37
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
38
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
39
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3858
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5zj-36y8-bbdt
11
url VCID-ttz3-sqez-7ffq
vulnerability_id VCID-ttz3-sqez-7ffq
summary kernel: guest->host denial of service from invalid xenbus transitions
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3699.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3699.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3699
reference_id
reference_type
scores
0
value 0.00507
scoring_system epss
scoring_elements 0.66349
published_at 2026-04-29T12:55:00Z
1
value 0.00507
scoring_system epss
scoring_elements 0.66201
published_at 2026-04-01T12:55:00Z
2
value 0.00507
scoring_system epss
scoring_elements 0.66241
published_at 2026-04-02T12:55:00Z
3
value 0.00507
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-04T12:55:00Z
4
value 0.00507
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-07T12:55:00Z
5
value 0.00507
scoring_system epss
scoring_elements 0.66285
published_at 2026-04-08T12:55:00Z
6
value 0.00507
scoring_system epss
scoring_elements 0.66299
published_at 2026-04-09T12:55:00Z
7
value 0.00507
scoring_system epss
scoring_elements 0.66319
published_at 2026-04-11T12:55:00Z
8
value 0.00507
scoring_system epss
scoring_elements 0.66305
published_at 2026-04-12T12:55:00Z
9
value 0.00507
scoring_system epss
scoring_elements 0.66274
published_at 2026-04-13T12:55:00Z
10
value 0.00507
scoring_system epss
scoring_elements 0.66308
published_at 2026-04-16T12:55:00Z
11
value 0.00507
scoring_system epss
scoring_elements 0.66325
published_at 2026-04-18T12:55:00Z
12
value 0.00507
scoring_system epss
scoring_elements 0.6631
published_at 2026-04-21T12:55:00Z
13
value 0.00507
scoring_system epss
scoring_elements 0.66334
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3699
3
reference_url http://secunia.com/advisories/42372
reference_id
reference_type
scores
url http://secunia.com/advisories/42372
4
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
5
reference_url http://secunia.com/advisories/43056
reference_id
reference_type
scores
url http://secunia.com/advisories/43056
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
8
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/45039
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45039
10
reference_url http://www.securitytracker.com/id?1024786
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024786
11
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
12
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
13
reference_url http://www.vupen.com/english/advisories/2011/0213
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0213
14
reference_url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/59f097ef181b
reference_id
reference_type
scores
url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/59f097ef181b
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=636411
reference_id 636411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=636411
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3699
reference_id CVE-2010-3699
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3699
33
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
34
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
fixed_packages
aliases CVE-2010-3699
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttz3-sqez-7ffq
12
url VCID-v5g5-3pv6-dqa4
vulnerability_id VCID-v5g5-3pv6-dqa4
summary kernel: gdth: integer overflow in ioc_general()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
8
reference_url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
reference_id
reference_type
scores
url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
9
reference_url http://openwall.com/lists/oss-security/2010/11/09/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/1
10
reference_url http://openwall.com/lists/oss-security/2010/11/09/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/3
11
reference_url http://openwall.com/lists/oss-security/2010/11/09/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/4
12
reference_url http://openwall.com/lists/oss-security/2010/11/09/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/5
13
reference_url http://openwall.com/lists/oss-security/2010/11/10/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/12
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29439
published_at 2026-04-29T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29824
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29917
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29733
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29795
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29839
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29794
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29743
published_at 2026-04-13T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29761
published_at 2026-04-16T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29739
published_at 2026-04-18T12:55:00Z
12
value 0.00112
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-21T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29615
published_at 2026-04-24T12:55:00Z
14
value 0.00112
scoring_system epss
scoring_elements 0.29501
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
16
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
17
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
18
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
19
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
20
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
21
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
22
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
23
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
24
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44648
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
32
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
33
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651147
reference_id 651147
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651147
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
reference_id CVE-2010-4157
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
51
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
52
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
53
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
54
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
55
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
56
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
57
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
60
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
61
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4157
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5g5-3pv6-dqa4
13
url VCID-vwj3-5b6z-17b1
vulnerability_id VCID-vwj3-5b6z-17b1
summary kernel: sctp: do not reset the packet during sctp_packet_config
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
4
reference_url http://marc.info/?l=oss-security&m=128534569803598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128534569803598&w=2
5
reference_url http://marc.info/?l=oss-security&m=128537701808336&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128537701808336&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
reference_id
reference_type
scores
0
value 0.04322
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-29T12:55:00Z
1
value 0.04322
scoring_system epss
scoring_elements 0.88856
published_at 2026-04-01T12:55:00Z
2
value 0.04322
scoring_system epss
scoring_elements 0.88865
published_at 2026-04-02T12:55:00Z
3
value 0.04322
scoring_system epss
scoring_elements 0.8888
published_at 2026-04-04T12:55:00Z
4
value 0.04322
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-07T12:55:00Z
5
value 0.04322
scoring_system epss
scoring_elements 0.889
published_at 2026-04-08T12:55:00Z
6
value 0.04322
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-09T12:55:00Z
7
value 0.04322
scoring_system epss
scoring_elements 0.88917
published_at 2026-04-11T12:55:00Z
8
value 0.04322
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-12T12:55:00Z
9
value 0.04322
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-13T12:55:00Z
10
value 0.04322
scoring_system epss
scoring_elements 0.88925
published_at 2026-04-16T12:55:00Z
11
value 0.04322
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-18T12:55:00Z
12
value 0.04322
scoring_system epss
scoring_elements 0.8892
published_at 2026-04-21T12:55:00Z
13
value 0.04322
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
8
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
11
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
12
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
13
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
18
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/43480
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43480
20
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
23
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
24
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
25
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=637675
reference_id 637675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=637675
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
reference_id CVE-2010-3432
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
38
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
39
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
40
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
41
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
42
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
43
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
44
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
45
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
46
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3432
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwj3-5b6z-17b1
Fixing_vulnerabilities
Risk_score8.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-194.32.1%3Farch=el5