Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.9-89.35.1?arch=EL
Typerpm
Namespaceredhat
Namekernel
Version2.6.9-89.35.1
Qualifiers
arch EL
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-519v-6b9u-dygr
vulnerability_id VCID-519v-6b9u-dygr
summary kernel: drivers/serial/serial_core.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
1
reference_url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
reference_id
reference_type
scores
url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
4
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
9
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/43806
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43806
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648660
reference_id 648660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648660
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
reference_id CVE-2010-4075
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
24
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
27
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
28
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
29
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
30
reference_url https://usn.ubuntu.com/1090-1/
reference_id USN-1090-1
reference_type
scores
url https://usn.ubuntu.com/1090-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
35
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
36
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4075
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-519v-6b9u-dygr
1
url VCID-5x5t-fnw6-kqea
vulnerability_id VCID-5x5t-fnw6-kqea
summary kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lkml.org/lkml/2010/9/25/41
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/25/41
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
14
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
16
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
17
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
18
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
24
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/45058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45058
26
reference_url http://www.securityfocus.com/bid/45063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45063
27
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
28
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
29
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
30
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648669
reference_id 648669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648669
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
reference_id CVE-2010-4080
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
52
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
53
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
54
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4080
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x5t-fnw6-kqea
2
url VCID-643a-mvrh-bbap
vulnerability_id VCID-643a-mvrh-bbap
summary kernel: ipc/compat*.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/492
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/492
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49495
published_at 2026-04-29T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49475
published_at 2026-04-01T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49504
published_at 2026-04-02T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49531
published_at 2026-04-04T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49484
published_at 2026-04-07T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49539
published_at 2026-04-08T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49534
published_at 2026-04-09T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49552
published_at 2026-04-11T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49523
published_at 2026-04-12T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49525
published_at 2026-04-13T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49572
published_at 2026-04-16T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49569
published_at 2026-04-18T12:55:00Z
12
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-26T12:55:00Z
13
value 0.00262
scoring_system epss
scoring_elements 0.4953
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
13
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://securityreason.com/securityalert/8366
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8366
17
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
18
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/45073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45073
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
32
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
33
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
34
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648658
reference_id 648658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648658
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
reference_id CVE-2010-4073
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
52
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
53
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
54
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4073
risk_score 3.4
exploitability 2.0
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-643a-mvrh-bbap
3
url VCID-6x7p-5tt7-5fdv
vulnerability_id VCID-6x7p-5tt7-5fdv
summary kernel: missing tty ops write function presence check in hci_uart_tty_open()
references
0
reference_url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
reference_id
reference_type
scores
url http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.2998
published_at 2026-04-29T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30393
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30422
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30468
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30278
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30337
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30371
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.3033
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30283
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30297
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.3028
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30235
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.3017
published_at 2026-04-24T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.30055
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4242
4
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
10
reference_url https://lkml.org/lkml/2010/10/7/255
reference_id
reference_type
scores
url https://lkml.org/lkml/2010/10/7/255
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
14
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/45014
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45014
16
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
17
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
18
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
19
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
20
reference_url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=641410
reference_id 641410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=641410
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
reference_id CVE-2010-4242
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4242
24
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
27
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
28
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
29
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
30
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
35
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4242
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6x7p-5tt7-5fdv
4
url VCID-f744-pabt-7ffu
vulnerability_id VCID-f744-pabt-7ffu
summary kernel: socket filters infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
reference_id
reference_type
scores
0
value 0.00199
scoring_system epss
scoring_elements 0.41788
published_at 2026-04-29T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.41939
published_at 2026-04-01T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.42
published_at 2026-04-02T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.42028
published_at 2026-04-04T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.41954
published_at 2026-04-07T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.42005
published_at 2026-04-08T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42016
published_at 2026-04-09T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42038
published_at 2026-04-11T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-12T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.41987
published_at 2026-04-13T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42035
published_at 2026-04-16T12:55:00Z
11
value 0.00199
scoring_system epss
scoring_elements 0.42009
published_at 2026-04-18T12:55:00Z
12
value 0.00199
scoring_system epss
scoring_elements 0.41938
published_at 2026-04-21T12:55:00Z
13
value 0.00199
scoring_system epss
scoring_elements 0.41878
published_at 2026-04-24T12:55:00Z
14
value 0.00199
scoring_system epss
scoring_elements 0.4187
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
11
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
12
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
15
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
16
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
17
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
18
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/514705
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514705
27
reference_url http://www.securityfocus.com/archive/1/514845
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514845
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44758
30
reference_url http://www.spinics.net/lists/netdev/msg146361.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146361.html
31
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651698
reference_id 651698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651698
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
reference_id CVE-2010-4158
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
51
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
52
reference_url https://www.securityfocus.com/bid/44758/info
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://www.securityfocus.com/bid/44758/info
53
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
54
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
55
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
56
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
57
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
60
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
61
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
62
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
63
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
64
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
65
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4158
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f744-pabt-7ffu
5
url VCID-m6hm-2cau-4fdg
vulnerability_id VCID-m6hm-2cau-4fdg
summary kernel: net/packet/af_packet.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
1
reference_url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
2
reference_url http://openwall.com/lists/oss-security/2010/11/02/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/10
3
reference_url http://openwall.com/lists/oss-security/2010/11/02/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/12
4
reference_url http://openwall.com/lists/oss-security/2010/11/02/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/7
5
reference_url http://openwall.com/lists/oss-security/2010/11/02/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/9
6
reference_url http://openwall.com/lists/oss-security/2010/11/04/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/5
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17869
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1806
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18221
published_at 2026-04-02T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-04T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-07T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18122
published_at 2026-04-09T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-11T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-12T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-13T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-16T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-18T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18021
published_at 2026-04-21T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-24T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.17904
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/44630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44630
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
23
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=649715
reference_id 649715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=649715
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
reference_id CVE-2010-3876
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
37
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
38
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
39
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
40
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
41
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
42
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
43
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
44
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
45
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
46
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
47
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
48
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
49
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
50
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3876
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hm-2cau-4fdg
6
url VCID-mcdj-296n-1kc9
vulnerability_id VCID-mcdj-296n-1kc9
summary kernel: unix socket local dos
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lkml.org/lkml/2010/11/23/395
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/23/395
3
reference_url http://lkml.org/lkml/2010/11/23/450
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/23/450
4
reference_url http://lkml.org/lkml/2010/11/25/8
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/11/25/8
5
reference_url http://marc.info/?l=linux-netdev&m=129059035929046&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=129059035929046&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4249
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-29T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.23998
published_at 2026-04-24T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23987
published_at 2026-04-26T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24931
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24999
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25044
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25058
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25041
published_at 2026-04-01T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24977
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-18T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-21T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25018
published_at 2026-04-12T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.25118
published_at 2026-04-02T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.25158
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4249
8
reference_url http://secunia.com/advisories/42354
reference_id
reference_type
scores
url http://secunia.com/advisories/42354
9
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url http://www.exploit-db.com/exploits/15622/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15622/
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2
15
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/10
16
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/2
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/45037
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45037
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
23
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656756
reference_id 656756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656756
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4249
reference_id CVE-2010-4249
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4249
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c
reference_id CVE-2010-4249;OSVDB-69527
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c
32
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
33
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
34
reference_url https://access.redhat.com/errata/RHSA-2011:0303
reference_id RHSA-2011:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0303
35
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
36
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
37
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
38
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
39
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
40
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
41
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
42
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
43
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
44
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
fixed_packages
aliases CVE-2010-4249
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdj-296n-1kc9
7
url VCID-nej4-chcw-fqah
vulnerability_id VCID-nej4-chcw-fqah
summary kernel: ipc/sem.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2475
published_at 2026-04-29T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25032
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25071
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24846
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24961
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24976
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24936
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24881
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24894
published_at 2026-04-16T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-18T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24865
published_at 2026-04-21T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24809
published_at 2026-04-24T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24796
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
14
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
15
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
16
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
18
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
20
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/43809
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43809
28
reference_url http://www.spinics.net/lists/mm-commits/msg80234.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/mm-commits/msg80234.html
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
32
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
33
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
34
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
35
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648673
reference_id 648673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648673
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
reference_id CVE-2010-4083
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
48
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
49
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
50
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
51
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
52
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
53
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
54
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
55
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
56
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
57
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
58
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
59
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
60
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4083
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nej4-chcw-fqah
8
url VCID-nq55-xn3b-8qdm
vulnerability_id VCID-nq55-xn3b-8qdm
summary kernel: ipc/shm.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/454
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/454
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2133
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21493
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21663
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21721
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21474
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.2161
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21622
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21585
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21528
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21525
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21533
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21501
published_at 2026-04-21T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21355
published_at 2026-04-24T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.21352
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
9
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
14
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
15
reference_url http://secunia.com/advisories/43161
reference_id
reference_type
scores
url http://secunia.com/advisories/43161
16
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
17
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
18
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
19
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
23
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/45054
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45054
30
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
31
reference_url http://www.ubuntu.com/usn/USN-1057-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1057-1
32
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
35
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
36
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
37
reference_url http://www.vupen.com/english/advisories/2011/0280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0280
38
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
39
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648656
reference_id 648656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648656
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
reference_id CVE-2010-4072
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
57
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
58
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
59
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
60
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
61
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
62
reference_url https://usn.ubuntu.com/1057-1/
reference_id USN-1057-1
reference_type
scores
url https://usn.ubuntu.com/1057-1/
63
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
64
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
65
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
66
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
67
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
68
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-4072
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nq55-xn3b-8qdm
9
url VCID-q4p1-vxct-cybq
vulnerability_id VCID-q4p1-vxct-cybq
summary kernel: tipc: heap overflow in tipc_msg_build()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
2
reference_url http://marc.info/?l=linux-netdev&m=128770476511716&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128770476511716&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3859
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34656
published_at 2026-04-29T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.34898
published_at 2026-04-01T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-02T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35124
published_at 2026-04-04T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35002
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35047
published_at 2026-04-08T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35075
published_at 2026-04-09T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35079
published_at 2026-04-11T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35044
published_at 2026-04-12T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35058
published_at 2026-04-16T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35043
published_at 2026-04-18T12:55:00Z
12
value 0.00146
scoring_system epss
scoring_elements 0.34997
published_at 2026-04-21T12:55:00Z
13
value 0.00146
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-24T12:55:00Z
14
value 0.00146
scoring_system epss
scoring_elements 0.34747
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3859
5
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/2
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/5
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/44354
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44354
17
reference_url http://www.spinics.net/lists/netdev/msg145247.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145247.html
18
reference_url http://www.spinics.net/lists/netdev/msg145248.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145248.html
19
reference_url http://www.spinics.net/lists/netdev/msg145262.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145262.html
20
reference_url http://www.spinics.net/lists/netdev/msg145263.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145263.html
21
reference_url http://www.spinics.net/lists/netdev/msg145264.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145264.html
22
reference_url http://www.spinics.net/lists/netdev/msg145265.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145265.html
23
reference_url http://www.spinics.net/lists/netdev/msg145352.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145352.html
24
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
25
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
26
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645867
reference_id 645867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645867
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3859
reference_id CVE-2010-3859
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3859
31
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
32
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
33
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
34
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
35
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
36
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
37
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
38
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
39
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
40
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-3859
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4p1-vxct-cybq
10
url VCID-v5g5-3pv6-dqa4
vulnerability_id VCID-v5g5-3pv6-dqa4
summary kernel: gdth: integer overflow in ioc_general()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
8
reference_url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
reference_id
reference_type
scores
url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
9
reference_url http://openwall.com/lists/oss-security/2010/11/09/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/1
10
reference_url http://openwall.com/lists/oss-security/2010/11/09/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/3
11
reference_url http://openwall.com/lists/oss-security/2010/11/09/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/4
12
reference_url http://openwall.com/lists/oss-security/2010/11/09/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/5
13
reference_url http://openwall.com/lists/oss-security/2010/11/10/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/12
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29439
published_at 2026-04-29T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29824
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29917
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29733
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29795
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29839
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29794
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29743
published_at 2026-04-13T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29761
published_at 2026-04-16T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29739
published_at 2026-04-18T12:55:00Z
12
value 0.00112
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-21T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29615
published_at 2026-04-24T12:55:00Z
14
value 0.00112
scoring_system epss
scoring_elements 0.29501
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
16
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
17
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
18
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
19
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
20
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
21
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
22
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
23
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
24
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44648
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
32
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
33
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651147
reference_id 651147
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651147
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
reference_id CVE-2010-4157
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
51
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
52
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
53
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
54
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
55
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
56
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
57
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
60
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
61
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4157
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5g5-3pv6-dqa4
Fixing_vulnerabilities
Risk_score8.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-89.35.1%3Farch=EL